Please turn JavaScript on
Behind the Shield Blog icon

Behind the Shield Blog

Want to stay in touch with the latest updates from Behind the Shield Blog? That's easy! Just subscribe clicking the Follow button below, choose topics or keywords for filtering if you want to, and we send the news to your inbox, to your phone via push notifications or we put them on your personal page here on follow.it.

Reading your RSS feed has never been easier!

Website title: Makes Email Safe For Business: Microsoft 365, Google Workspace.

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.05 / day

Message History

Spear phishing works because it doesn’t look suspicious. The message is tailored, the timing fits, and it often comes from someone the target recognizes. Stopping it takes more than one control.


Read full story

Short answer, yes.

The longer version is messier. AI on its own isn’t hostile. It’s just tooling. What’s changed is how cheaply and quickly it slots into existing tactics that work.


Read full story

Email is still where most access theft begins. Not because it delivers malware, but because it sits at the center of identity, approvals, and trust. A phishing email that captures credentials or a session token does not look like an infrastructure incident, but it often becomes one.


Read full story