Phish of the Week: International Sushi Day — and what that means for dead phish.

Happy International Sushi Day


We love dead phish around here. And there’s an important related milestone coming up next week that absolutely deserves to be celebrated –June 18th is International Sushi Day.

While the exact origins are a bit murky, it’s widely believed that Sushi originated somewhere around the 2nd century BC in South East Asia. It first started as a method (known as Narezushi) for preserving and storing dead fish. Over the years, sushi evolved in its preparation and presentation to the beloved dish we know now. I am hoping all the sushi lovers will take the time to have a special treat on that day!

Speaking of dead fish, we are seeing legacy SEG players exiting the public markets at a rapid pace. Just this past week, FireEye announced it is selling its products business to Symphony Technology. A couple of months ago, Proofpoint was acquired by Thoma Bravo. Both of them joined the ranks of previous players like Forcepoint and Symantec who have already retreated.

There’s a pattern here and it isn’t a surprising one – modern threats and distributed architectures require a fundamentally new analytics-first, cloud-native approach to keep up with – something that the legacy players struggle to do mightily and consequently are forced to retrench in the face of these changes.

U.S Department of Justice Elevates Ransomware to Terrorism Status

“They went after our gas and they went after our hot dogs. No one is out of bounds here.” -Christopher Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, on recent ransomware attacks.


On June 3rd, the Department of Justice announced that it is increasing ransomware incidents to the same priority level as terrorism. This priority level is reserved for a very short list of specific national security cases and highlights the priority the administration is giving ransomware attacks.

We are assessing the entire impact of this guidance, and what it could mean to ongoing security operations of organizations all across – though a few things are certain – it specifically calls out adding much stronger controls to prevent Ransomware in the first place, and providing co-ordinated disclosures and notifications in the event a breach is discovered.

In just a few months, we’ve experienced large-scale ransomware attacks on Colonial Pipeline, JBS, and now Martha’s Vineyard ferry. And the impact is material to our ongoing lives. Colonial Pipeline paid nearly $5 million dollars in ransom (although some of it was subsequently recovered by the government), JBS had to shut down production amid rising food costs, and Martha’s Vineyard ferry business experienced disruption.

The elevated severity and focus on supply chain attacks and ransomware is another reminder that — even if your users aren’t the initial victims of a cyber-attack, you must close phishing gaps coming from your digital ecosystem.

Learn how to stop the seven types of phishing attacks that originate from compromised vendors and suppliers, here. (7 mins)

Make Your Voice Heard!

We are committed to improving our products and providing the best services for you!

We’d love to hear from you. Your honest feedback is invaluable to us. You can post a review of Area 1 on Gartner Peer Insights. As an added incentive, you’ll receive a $25 gift card from Gartner for submitting your review.

PS: If you’re neutral or unhappy with us, I hope you’ll reply directly to this email and give us a chance to make it right before you leave your review — but that’s up to you!

Three Reasons to Upgrade to Area 1 for Better Email Security

Thoma Bravo announced its intention to acquire Proofpoint. The deal is not expected to close until the latter half of 2021, meanwhile,cyber-attacks are not slowing down.

Now is the time to re-evaluate and upgrade your email security.

Here are three reasons why upgrading to Area 1 means better email security.

    1. Better Detection Efficacy -Area 1 Security provides superior detection, blocks 30% more attacks than legacy SEGs, and detects attacks 24 days before industry benchmarks
    2. Cloud-Native Architecture -Area 1 Security’s cloud-native architecture provides agile security with faster ROI over other SEGs and improves email security TCO by 30%
    3. Customer & 3rd Party Analyst Endorsements -Leading research and analyst firms agree that Area 1 provides superior security to SEGs. GigaOm Research rates Area 1 as a Leader and Outperformer in their Phishing Prevention and Detection Report and Gartner names Area 1 a Representative Vendor for Integrated Email Security Solutions.

Compare email security solutions now.

Shalabh

Shalabh Mohan

VP, Product at Area 1

With a career spanning 20 years fighting bad guys online, Shalabh leads all product and go-to-market functions at Area 1 Security, with extensive prior experience across security, enterprise, and cloud infrastructure companies such as Aspen Networks, IronPort Systems, Cisco and Bracket Computing. Shalabh and his teams have taken products from conception all the way to large scale businesses; and in the process have consistently helped make the Internet a safer place. An alumnus of Stanford University and the University of Texas at Austin, Shalabh holds five patents and can claim to know something about enterprise infrastructure and security.

Cyber_Attack_Preemption
Beyond_the_Mirror