
Sign up to save your podcasts
Or


Today's guest on our tech podcast is Kevin O’Brien, CEO of GreatHorn.
Phishing continues to be a primary security problem for businesses. Think of all the spoofed emails you probably get from people asking for banking instructions or ‘invoice confirmation,’ messages from ‘banks’ that look surprisingly legit but ask for your credentials, and notes from ‘friends’ that look real but have an attachment that wasn’t expected.
GreatHorn is an email security company that was a finalist in the 2017 RSA Innovation Sandbox for its ability to utilize machine learning to automate the identification and remediate advanced email and social engineering attacks.
Kevin talks about the latest techniques criminals use, including the use of display name spoofs, social engineering techniques and increase in Business Service Impersonation attacks, where cybercriminals replicate communications from major brands like Walmart, DocuSign, and the US Postal Service.
We also discuss email security shortcomings in Office 365 and G Suite include end-user alerts (emails that fail DKIM go to workers, not tech pros), limited malicious URL scanning and limited ability to configure or fine-tune security policies.
I also find out more about GreatHorn's useful Phishing Risk Calculator and its annual Cloud Email Security report.
By Neil C. Hughes5
200200 ratings
Today's guest on our tech podcast is Kevin O’Brien, CEO of GreatHorn.
Phishing continues to be a primary security problem for businesses. Think of all the spoofed emails you probably get from people asking for banking instructions or ‘invoice confirmation,’ messages from ‘banks’ that look surprisingly legit but ask for your credentials, and notes from ‘friends’ that look real but have an attachment that wasn’t expected.
GreatHorn is an email security company that was a finalist in the 2017 RSA Innovation Sandbox for its ability to utilize machine learning to automate the identification and remediate advanced email and social engineering attacks.
Kevin talks about the latest techniques criminals use, including the use of display name spoofs, social engineering techniques and increase in Business Service Impersonation attacks, where cybercriminals replicate communications from major brands like Walmart, DocuSign, and the US Postal Service.
We also discuss email security shortcomings in Office 365 and G Suite include end-user alerts (emails that fail DKIM go to workers, not tech pros), limited malicious URL scanning and limited ability to configure or fine-tune security policies.
I also find out more about GreatHorn's useful Phishing Risk Calculator and its annual Cloud Email Security report.

1,301 Listeners

544 Listeners

1,657 Listeners

1,096 Listeners

630 Listeners

1,024 Listeners

305 Listeners

345 Listeners

234 Listeners

213 Listeners

511 Listeners

139 Listeners

353 Listeners

66 Listeners

671 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners