This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.| zvelo
This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.| zvelo
OSINT vs Commercial Threat Intelligence - A high level overview weighing the pros and cons for each type of threat feed.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
As we explore the critical role of data in powering the SASE solutions suite, this post focuses on the Firewall-as-a-Service.| zvelo
Curated threat data delivers the true value of threat intelligence offering the right data, accurately interpreted, and actionably presented.| zvelo
Social engineering attacks are a type of cybercrime that human weakness by using psychological manipulation to trick individuals.| zvelo
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.| zvelo
DNS Filtering and SWGs can offer core security functionality but the SASE framework requires CASBs to extend threat protection to cloud apps.| zvelo
zveloCTI provides curated, high veracity, actionable Threat Intelligence feeds on phishing websites, malicious URLs, & suspicious new domains.| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo
Attackers are using sophisticated TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.| zvelo
This post explores the integral role of threat intelligence in a Defense in Depth strategy and the necessity of high-quality threat data.| zvelo