Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cymulate and Symantec Announce a Shared Research of Email-Based Attacks

Cymulate, a provider of a leading Breach & Attack Simulation (BAS) platform which was recognized as a 2018 cool vendor by Gartner, announced a partnership with Symantec , to provide an Attacker-Defender collaboration to share the research into the latest email-based threats.

@CymulateLtd and @Symantec Announce Today a Shared Research of Email-Based Attacks #cybersecurity, #threats, #emailsecurity $SYMC

Cymulate’s Breach & Attack Simulation (BAS) platform enables organizations to launch simulations of multi-vector cyberattacks against their networks, immediately exposing vulnerabilities and providing mitigation suggestions to close each found gap. One of the attack vectors is email, which is one of the most common attack vectors.

Read More: Introducing Project Verte: Unlocking the Potential of Community and Technology in Ecommerce

Related Posts
1 of 4,926

The partnership allows Cymulate and Symantec to share the information of how attackers uses custom crafted emails and files to bypass security products and infect organizations worldwide. These insights enable Symantec to research the attacks simulated by Cymulate and provides the defenders a way to be one step ahead of the game.

Read More: Interview with Jesse Wolfersberger, Chief Data Officer at Maritz Motivation Solutions

“This partnership will enable Cymulate and Symantec to share critical information about real world attack patterns, for example how attackers use custom crafted emails and files to bypass security products and infect organizations worldwide. Based on the insights, Symantec can now combine information from these simulated attacks with real world data to provide a solution which remains one step ahead of the attackers,” said Jane Wong, VP Product at Symantec Corporation.

Read More: Wind River Teams With Renesas to Advance Autonomous Driving Applications

Leave A Reply

Your email address will not be published.