www.armorblox.com
Open in
urlscan Pro
2a05:d014:275:cb01::c8
Public Scan
Submitted URL: https://www.armorblox.com/blog/esg-report-highlights-persisting-weaknesses-in-email-security?utm_medium=offer&utm_sour...
Effective URL: https://www.armorblox.com/blog/esg-report-highlights-persisting-weaknesses-in-email-security/?utm_medium=offer&utm_sou...
Submission: On May 16 via api from US — Scanned from DE
Effective URL: https://www.armorblox.com/blog/esg-report-highlights-persisting-weaknesses-in-email-security/?utm_medium=offer&utm_sou...
Submission: On May 16 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form id="mktoForm_1082" class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate">
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
<div class="mktoAsterix">*</div>Email:
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired input"
aria-required="true" style="width: 150px;" placeholder="Email" data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton action" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid"
class="mktoField mktoFieldDescriptor input" value="1082" placeholder="formid"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor input" value="176-XMJ-030" placeholder="munchkinId">
</form>
<form class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="689107875" __biza="W___" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Why Armorblox Why ArmorbloxAbout UsNews & PressContact Us Popular Content * Blog HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER Learn more Product Product Capabilities * Advanced Threat Protection * Advanced URL Protection * Advanced Malware Detection * Advanced Data Loss Prevention * Security Operations * All Products Product Tours * Main Product Tour * Phishing Product Tour * Business Email Compromise Tour * Brand Impersonation Tour * Data Loss Prevention Product Tour * Vendor Compromise Tour * Security Operations Product Tour * All Product Tours Integrations * All Integrations Popular Content * Blog HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER Learn more Solutions By Use Case * Business Email Compromise * Email Account Compromise * Graymail and Recon Threats * Executive Phishing * Data Loss Prevention * Abuse Mailbox Remediation By Platform * Microsoft Office 365 * Google Workspace * Secure Email Gateway Augmentation By Industry * Financial Services * Education * Healthcare * Manufacturing * Retail Popular Content * Blog HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER Learn more CustomersResources Learning Center * Business Email Compromise * Vendor Email Compromise * Spear Phishing * Ransomware * Vishing * Email DLP * Tools and Templates * All Topics Resources * Templates * Whitepapers * Solution Briefs * Datasheets * Videos * Webinars * All Resources Blog * Articles & Thought Leadership * Threat Research * Product Features * Customer Success Stories * All Articles Humans of Cybersecurity * All Stories Popular Content * UNDERSTANDING YOUR ORGANIZATION’S VENDOR FRAUD AND SUPPLY CHAIN RISK * PROTECTING YOUR ORGANIZATION AGAINST VENDOR FRAUD AND SUPPLY CHAIN ATTACKS * PREVENT VENDOR AND SUPPLY CHAIN ATTACKS WITH ARMORBLOX Pricing Get a Demo Articles & Thought Leadership | 5 min read ENTERPRISE STRATEGY GROUP REPORT HIGHLIGHTS PERSISTING WEAKNESSES IN EMAIL SECURITY DESPITE MATURITY Share: 1. Armorblogs / 2. Articles & Thought Leadership / 3. Enterprise Strategy Group Report Highlights Persisting Weaknesses in Email Security Despite Maturity Lauryn Cash May 11, 2023 Recent report released by Enterprise Strategy Group (ESG) highlights the persisting weaknesses in email security, with 38% of respondents viewing email as the most vulnerable channel to threat actors. -------------------------------------------------------------------------------- The recently released Armorblox and Enterprise Strategy Group (ESG) report provides an in-depth analysis of the current state of enterprise email security and the challenges that organizations face in securing their communications channels. The report highlights the critical need for organizations to adopt more robust and comprehensive email security measures to protect against today's advanced email threats, and underscores the importance of prioritizing sophisticated email security as a key component of a comprehensive cybersecurity strategy, particularly as remote work and digital transformation continue to shape the modern enterprise landscape. EMAIL REMAINS CHANNEL MOST VULNERABLE TO THREAT ACTORS When looking at the communication and collaboration mechanisms considered most vulnerable to threats, we see file sharing and cloud storage tools plus messaging in the top four. But by almost 4x, we see email taking the lead by a significant percentage. This vulnerability is likely due to the widespread use of email for both internal and external communications, as well as the sensitive information that may be exchanged through email. Fig 1: Email considered most vulnerable threat compared to top 8 communication and collaboration mechanisms [source: Enterprise Strategy Group, a division of TechTarget, Inc. eBook, The Freedom to Communicate and Collaborate, April 2023.] > “While most organizations are leveraging six or more tools for communication > and collaboration, email tops the list by a wide margin as the channel > considered most vulnerable to threat actors.” > - Dave Gruber, Principal Analyst at Enterprise Strategy Group (ESG) The significant gap between email and file sharing and cloud storage tools (coming in second place at 13%, emphasizes the high level of risk associated with email communication. To combat these risks and the vulnerabilities these collaboration tools present, organizations should look to augment native email security with API-based email security that provide strong email security measures to identify and prevent targeted, email-based attacks. Other communication and collaboration tools listed: messaging, application-specific workflow communications, video conferencing, shared whiteboarding, shared project management, and shared calendar also pose a certain level of risk. It is best practice for organizations to implement security measures specific to each mechanism – multi-factor authentication, secure messaging and password protection tools, and access control for shared communication and project management tools. The data gathered from Armorblox and ESG shed light on the importance of prioritizing email security, as it is considered the most vulnerable mechanism for communication and collaboration. It is crucial for organizations to adopt and implement API-based email security that mitigates the risks associated with legacy security tools to ensure the safety and protection of end users, the organization, and sensitive information. THE GAPS IN PRIMARY EMAIL FAIL TO PROVIDE THE NECESSARY PROTECTION TO COMBAT TODAY’S THREATS The data gathered by Armorblox and ESG highlights the multitude of gaps that still persist in legacy and native email security solutions that many organizations rely on. As the data suggests, these solutions fail to provide the necessary protection to combat today's email attacks, which include both external and internal threats. In a recent report, Armorblox found that a significant 56% of all email attacks bypassed legacy security filters, indicating the inadequacy of traditional security solutions to detect and prevent new and evolving email-based threats. Additionally, a startling 52% of all attacks involved sensitive user data, highlighting the severity of the consequences of email attacks. Coupled with the data gathered by ESG, both parties are in agreement that primary email security solutions are ineffective in providing the necessary protection to combat today’s email attacks. The lack of protection, in turn, undermines the efficacy, compliance, and reliability of email communication, leading to potentially severe consequences for organizations. Fig 2: Challenges experienced with current primary email security solution [source: Enterprise Strategy Group, a division of TechTarget, Inc. eBook, The Freedom to Communicate and Collaborate, April 2023.] These findings point towards the need for organizations to reassess their email security measures and adopt more robust and comprehensive solutions that address the gaps in legacy and native security solutions. Such measures may include the use of GPT-powered email security solutions that can detect and prevent advanced email threats, including spear phishing, vendor fraud, internal threats and account compromise, and social engineering attacks. -------------------------------------------------------------------------------- READ THE FULL ANALYSIS OF THE CHALLENGES THAT ORGANIZATIONS FACE IN SECURING THEIR COMMUNICATION CHANNELS BY DOWNLOADING THE FULL ESG REPORT. Download Report SUBSCRIBE FOR THE MOST UP-TO-DATE EMAIL SECURITY INSIGHTS Sign up for our newsletter to get the latest updates on the email threat landscape, including new trends and attacks. * Email: Subscribe SEE ARMORBLOX IN ACTION See how Armorblox uses the power of Natural Language Understanding (NLU) and machine learning models to prevent BEC and targeted phishing attacks, prevent unauthorized exposure of sensitive PII, PCI, and PHI, and reduce incident response times. Take Product Tour RELATED ARTICLES Articles & Thought Leadership KEY TAKEAWAYS: ARMORBLOX 2023 EMAIL SECURITY THREAT REPORT Key findings of Armorblox 2023 Email Security Threat Report, which documents the rise in targeted attacks, a shift in trends across a broad range of attacks, and highlights the use of language to bypass existing email security controls. See some of the key findings of this this report, a study of email-based attack trends compiled by analyzing over 4 billion emails and stopping over 800,000 threats every month, while protecting over 58,000 customers. Articles & Thought Leadership HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER In a time when bad actors can easily access AI, ML, and LLM tools for malicious intent, organizations will need to take extra steps to protect themselves from targeted email attacks. Here are some of the most frequently asked questions our CEO, DJ Sampath, gets about AI and LLMs like GPT and his thoughts on this technology to date, where he believes it’s headed next, and how it will change cybersecurity forever. Articles & Thought Leadership ARMORBLOX CONTEXT 2023 - RSAC EDITION RECAP Check out a full recap of Armorblox CONTEXT 2023 - RSAC Edition event that happened on April 24, 2023, at the Children's Creativity Museum in San Francisco. The event brought together top cybersecurity experts from the FBI, CISA, Albertsons Companies, and SentinelOne, among others, to share their insights and have impactful discussions about topics such as AI, supply chain attacks, financial fraud, and more. Articles & Thought Leadership 5 STEPS CISOS SHOULD TAKE TO IMPROVE THEIR SECURITY POSTURE IN 2023 CISOs are tasked with ensuring the security of their organization by guarding them against cyberattacks and data loss. Let's review 5 important steps that CISOs can take to improve their organization's security posture in 2023 and beyond. Articles & Thought Leadership EMAIL SECURITY PREDICTIONS FOR 2023 AND BEYOND 2022 has been a year full of changes for cybersecurity teams worldwide, and new variants of targeted email attacks –compromising vendors to launch supply chain attacks, attempts at stealing credentials, and different flavors of executive impersonation. Read our astute predictions for 2023 - and how Armorblox is leading the charge to better protect organizations. Articles & Thought Leadership PROTECTING CRITICAL BUSINESS WORKFLOWS IN THE AGE OF CHATGPT ChatGPT, an AI-generated chatbot, presents cybercriminals and scammers with a free and easy-to-use tool for generating socially engineered attacks such as financial fraud, credential phishing, vendor fraud, and more. Learn how to protect your employees and organization from these types of attacks and data loss. EXPERIENCE THE ARMORBLOX DIFFERENCE If you have questions about email security, Armorblox has the answers you're looking for. Request a product demo to find out more. Get a Demo 100 S. Murphy Avenue, Suite 200 Sunnyvale, CA 94086 (650) 260-5352 ARMORBLOX EMAIL SECURITY 4.7 11 Ratings Submit a review As of 16 May 2023 Company * Why Armorblox * About Us * News * Careers * Customers Product * Overview * Product Tour * Integrations * Pricing Solutions * Business Email Compromise * Email Account Compromise * Graymail and Recon Threats * Executive Phishing * Email Data Loss Prevention * Abuse Mailbox Remediation Resources * Resources * Trust Center * Blog * Contact Support © 2023 Armorblox. All Rights Reserved. Privacy Policy. Cookie Settings By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Privacy Policy Cookies Settings Reject All Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Cookies Details Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest Switch Label label Switch Label label Switch Label label * View Cookies * Name cookie name Reject All Confirm My Choices