Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

INKY Enhances Next-Gen Email Phishing Protection Solution with Account Takeover Protection

Anti-Phishing Pioneer Uses Stylometry and Social Graphing Techniques to Prevent Account Takeover

INKY Technology Corporation, a pioneer in next-gen email phishing protection, announced the addition of Account Takeover (ATO) Protection to the company’s INKY Phish Fence Platform. Email is an inherently trusted means of communicating for business, if cybercriminals compromise just one email account, they can gain trusted access to an organization’s whole network.

INKY is the only vendor in the cybersecurity industry that uses innovative machine learning techniques referred to as stylometry, and social graphing, to create individual sender profiles and block ATO attacks for users and most importantly, third-parties.

Recommended AI News: Luminoso Expands Product Leadership with Two New Hires

Related Posts
1 of 40,510

“We are seeing cybercriminals routinely use ATO attacks to evade SEG reputational filters and even impersonate the specific people whose accounts they’ve compromised. Outside of employees, the real concern is third-party ATO, as organizations can’t force vendors to implement multi-factor authentication,” said Dave Baggett, CEO at INKY. “With INKY’s new ATO Protection approach, organizations can stop these attacks in their tracks before they wreak havoc and steal proprietary information.”

ATO attacks allow adversaries to impersonate employees and leverage that access to exploit third-party vulnerabilities which can cause widespread collateral loss. Because these attacks appear to be coming from a trusted source, they are inherently difficult to detect. INKY solves this problem by using stylometry and other elements from emails to build sender profiles and catch attempts to forge email from known users — even when those forgeries come from the real senders’ actual email accounts.

Recommended AI News: VEXXHOST Joins the OpenStack Foundation in Its Transformation to OIF

“INKY’s approach to protecting against account takeover attacks is the only real solution I’ve seen on the market-to-date. Many vendors are claiming the ability to solve this problem, but lack the technological advancement to back it up,” said Ron Gula, President & Co-Founder at Gula Tech Adventures. “This is the biggest development I’ve seen in the email security market in recent years.”

Recommended AI News: Newly-Renamed IDX Launches IDX Privacy, the First All-in-One Consumer Privacy Protection Product

2 Comments
  1. Copper scrap reclaiming Copper scrap waste reduction Scrap metal procurement strategies
    Recycling services for Copper cable scrap, Metal salvage yard solutions, Copper scrap purchasing contracts

  2. Metal scrap recycling Ferrous metal recycling value chain Iron scrap trade regulations

    Ferrous material waste audits, Iron waste reclamation and recycling, Scrap metal reclaiming depot

Leave A Reply

Your email address will not be published.