Discover our blog

Email Security

Beware the Business Email Compromise

According to the FBI, there has recently been a huge increase in the number of spear phishing scams known as a...

Phishing

Phishing in Healthcare Settings

Despite the fact that security and compliance requirements for healthcare are fairly well understood today, new threats...

Phishing

Don’t Be a Turkey: Avoiding Holiday Phishing Scams

Crooks don’t take time off like the rest of us. Our holiday shopping, travel and charitable giving provide a rich...

Phishing

The Corporate Impact of Phishing

Phishing is a hacking technique that uses email and fake websites to trick individuals into divulging confidential...

Email Security

[Infographic] 10 Years of Spam

Malicious attacks today are numerous but, luckily, remain preventable with the right tools.

Botnets, a phenomenon in...

Email Security

Vade achieves worldwide leadership on Graymail Management

Cisco and Vade signed an OEM agreement to manage e-subscriptions and improve email classification for a better user...

Email Security

5 Tips on How to Keep Your Inbox Clutter-Free

The problem of inbox clutter is eternal. Various solutions on the market today don’t solve this problem, and according...