What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ProofPoint.webp 2024-08-30 12:42:42 Comparaison des points de preuve et une sécurité anormale: le fabricant de nourriture n'en comprend qu'une seule dans leur recette de succès
Comparing Proofpoint and Abnormal Security: Food Manufacturer Includes Only One in their Recipe for Success
(lien direct)
As modern global supply chains expand, food processors, manufacturers and agriculture service providers are faced with an impossible security task. Not only are they responsible for feeding families worldwide, but they must also be hyper-vigilant about cyber threats that increasingly target them. And they must do all this despite shrinking budgets and higher constraints on their resources.   For these reasons, the success of their security strategy often depends on their ability to:   Continuously detect threats that target their people  Ease the growing burden on their IT teams  Decrease their reliance on ineffective native security tools   We learned this from one of our customers in the food manufacturing industry who recently compared Proofpoint Threat Protection to Abnormal Security\'s point product. We have anonymized their story in order to share their experiences and lessons learned. The following blog offers insights into how the food industry can build a better people-centric defense.  A slow descent into message madness  Spurred by progressively deceptive attacks from threat actors, the manufacturer had seen a gradual decline in the threat efficacy of its email security built on Microsoft. Microsoft\'s native security has historically struggled against the types of advanced email attacks the customer observed.   The security team saw an influx of employee-reported malicious messages which primarily used impersonation and social engineering techniques. These attacks included:  Invoicing fraud and CEO spoofing through business email compromise (BEC)    Malware from compromised supplier accounts  Telephone-oriented attack delivery (TOAD)  The backlog in their abuse mailbox that contained user-reported emails grew by the day. The team needed to manually investigate and remediate each of these threats while trying to control the inflow of new ones. This put their already stretched thin security team under unsustainable pressure. The company worried about jeopardizing their place in the international food chain and their mission to feed communities.  After a near miss with an email containing ransomware, the manufacturer decided it was time for a change. Enter Proofpoint and Abnormal Security.  Comparing Proofpoint and Abnormal side-by-side  The food manufacturer ran concurrent evaluations with Proofpoint and Abnormal Security to find the best solution to protect their more than 7,000 employees, countless customers, suppliers and third-party partners. This comparison process revealed the differences between the two offerings.   Each company has a different approach. Proofpoint provides a comprehensive platform. It detects threats continuously to protect people throughout the entire email delivery life cycle. In contrast, Abnormal focuses on limited post-delivery detection and remediation.  The team began its selection process with very clear decision criteria. It was determined to find the right partner to augment the company\'s native Microsoft email security and defend its 100-year-old heritage brand. Below are the key areas where the customer compared Proofpoint and Abnormal.   End-to-end detection capabilities-Proofpoint wins  Abnormal\'s restrictive structure only allows malicious messages to be detected after they are delivered to a user\'s inbox. It has a 0% pre-delivery efficacy rate, meaning all email attacks must be retracted from users\' inboxes. This puts users at undue risk. Proofpoint threat research found that 1-in-7 clicks on malicious links occur within 60 seconds of a message\'s delivery. And one-third of replies to BEC messages happen in less than five minutes.   Proofpoint Threat Research results.   The customer recalled that Abnormal relies too heavily on behavioral AI and lacks sandboxing capabilities. They shared concerns that this would expose their company to never-before-seen links and attachments. &nbs Ransomware Spam Malware Tool Threat Heritage ★★
Last update at: 2025-05-10 21:07:38
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter