Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks

Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks

Artificial IntelligenceCyber CrimeCyber EspionageData BreachVulnerabilities and Flaws

There is no denying that business email compromise (BEC) is big business for cybercriminals. Chances are, you’ve probably been a recipient of 'a well researched' social-engineered emails yourself. But the question remains… who is behind these increasingly sophisticated email attacks, and why did they become so popular in recent years? Why is it that humans worldwide fall for it and businesses still bleed easy money to these cybercriminals? Will we ever be able to trust our email?

Join this insightful conversation between SC Media's Tony Morbin and Agari's Crane Hassold on why security teams need to adopt an approach that is based on threat actor identity rather than type of fraudulent activity, in order to detect email fraud and protect their businesses.

Loading feed

share