| PUBLICATION | DATE | ARTICLE |
| December | | |
| BusinessWire | 5 | Chubb, Globally Renowned Fire Safety and Security Business, Selects IRONSCALES to Replace SEG for Enterprise Email Security Solution |
| Security Boulevard | 1 | How to Build a Phishing Playbook Part 1: Preparation |
| November | | |
| CXO Today | 30 | Radware Report Finds the Downtime Cost of an Application DDoS Attack Averages $6,130 Per Minute |
| E-Commerce Times | 22 | The Complex Implications of Grinch and Scalper Bots Beyond the Holidays |
| The Hacker News | 20 | Product Walkthrough: Silverfort’s Unified Identity Protection Platform |
| Security Magazine | 10 | Downtime cost of an application DDoS attack averages $6130 per minute |
| ITBrief New Zealand | 9 | DDoS attacks cost firms over $6K per minute, Radware study reveals |
| Bakersfield | 9 | Radware Report Finds the Downtime Cost of an Application DDoS Attack Averages $6,130 Per Minute |
| GlobeNewswire | 8 | Radware Report Finds the Downtime Cost of an Application DDoS Attack Averages $6,130 Per Minute |
| October | | |
| IT Jungle | 25 | Four cybercrime trends for security pros to watch now |
| Security Intelligence | 23 | Taking the complexity out of identity solutions for hybrid environments |
| Global Arbitration Review | 12 | Using Technology and e-Disclosure |
| September | | |
| Yahoo Finance | 27 | IRONSCALES Announces AWS Marketplace Availability, Expanding Email Security Solutions to AWS Partners and Customers |
| The Hacker News | 18 | Think Your MFA and PAM Solutions Protect You? Think Again |
| HelpNet Security | 12 | Companies need to rethink how they implement identity security |
| The New Stack | 11 | Is Policy as Code the Cure for Multicloud Config Chaos? |
| Israel Defense | 7 | Silverfort Research: 83% of organizations Experienced Identity-Related Breach |
| Press release | 6 | Silverfort and Osterman Research Report Exposes Critical Gaps in Identity Threat Protection |
| Security Boulevard | 5 | Time to Wake Up: The Defenses of the Identity Attack Surface are Broken |
| CloudTech | 4 | Only 24% of enterprises know where cloud apps are and who has access |
| August | | |
| Security Boulevard | 30 | Adaptive AI Essential to Counter Rapid AI Adoption in BEC |
| American Security Today | 30 | Cybercriminals Already Using AI in Email Attacks, New Report Confirms |
| Security Magazine | 24 | 91% of security pros say cybercriminals are using AI in email attacks |
| HelpNet Security | 24 | Lack of visibility into cloud access policies leaves enterprises flying blind |
| HelpNet Security | 23 | Cybercriminals turn to AI to bypass modern email security measures |
| BusinessWire | 21 | Strata Identity Study Reveals Fragmented Access Policies are Top Security Concern for Multi-Cloud Enterprises |
| PRNewswire | 21 | New Perception Point and Osterman Research Report Shows Over 91% of Organizations Have Experienced AI-enhanced Email Attacks and 84% Expect Continued Use of AI to Circumvent Existing Security Systems |
| MediaPost | 21 | AI Deemed Critical For Fighting AI Email Attacks |
| BusinessWire | 17 | New IRONSCALES and Osterman Research Report Shows Adaptive AI Essential to Counter Rapid AI Adoption in BEC and Socially Engineered Email Attacks |
| July | | |
| sdxCentral | 29 | The 5G paradox: Why increasing IoT efficiency creates new security risks |
| CSO | 21 | Code42 adds customizable insider risk alerts to Incyder Also at: ARN |
| Infosecurity Magazine | 20 | Half of AI Open Source Projects Reference Buggy Packages |
| ITPro Today | 18 | Email Phishing Protection Must Leave No Stone Unturned |
| BusinessWire | 13 | With Cloud Service Attacks on the Rise, Only 48% of Enterprise Security Leaders Say Their Threat Defenses Are Effective |
| VentureBeat | 13 | Network, IAM and cloud are the top 3 cybersecurity spending priorities for 2023 |
| June | | |
| BusinessWire | 20 | IRONSCALES Revolutionizes Email Security with Powerful New Generative AI Capabilities |
| Infosecurity Magazine | 20 | Ironscales Launches GPT-Powered Chat Assistant for Self-Service Threat Reporting |
| FutureScot | 19 | Cyber Workforce Resilience Trend Report |
| HelpNet Security | 19 | Goodbyes are difficult, IT offboarding processes make them harder |
| HelpNet Security | 12 | The multiplying impact of BEC attacks |
| Reseller News | 8 | Lacework’s new CIEM uses ML to fish out high-risk identities |
| CSO | 6 | Lacework’s new CIEM uses ML to fish out high-risk identities |
| May | | |
| CIO Dive | 30 | Cyber resilience programs fall short on preparing workers for a crisis |
| CSO | 18 | Organizations reporting cyber resilience are hardly resilient: Study |
| Cybersecurity Dive | 18 | Cyber resilience programs falling short on preparing workers for a crisis |
| BusinessWire | 17 | New Osterman Research Report Finds Cyber Resilience Programs are Falling Short, With More Than Half of Security Leaders Revealing Their Workforce Is Not Prepared for A Cyberattack |
| CSO | 15 | New security tool lets you bypass SSL errors |
| CSO | 9 | Cybersecurity stress returns after a brief calm: Proofpoint report |
| Security Boulevard | 3 | Defending Against Known, Unknown & Unknown-Unknown Email Scams |
| April | | |
| CSO | 25 | Abnormal Security expands threat protection to Slack, Teams and Zoom |
| BusinessWire | 19 | IRONSCALES Unveils Cutting-Edge New Capabilities to Help Stem Rising Tide of Business Email Compromise |
| Security Boulevard | 17 | Unlocking Your Security Team’s Potential: How Custom Workflows and Abuse Mailbox by Armorblox Optimize Security Operations and Boost Efficiency |
| March | | |
| Security Boulevard | 27 | Business Email Compromise Threats Soar Past Phishing Risks |
| BusinessWire | 9 | New Security Report from IRONSCALES and Osterman Research Shows Threat of Business Email Compromise Twice as High as That of Phishing Overall |
| Security Boulevard | 7 | Are You Feeling Cloud Security Imposter Syndrome? |
| February | | |
| Security Boulevard | 27 | CISO Investment Priorities for Cybersecurity 2023 |
| CSO | 21 | Alcatraz AI streamlines facial recognition access control with mobile update |
| Security Boulevard | 20 | The inherent risk in subsidiary governance |
| Security Boulevard | 16 | Perceived cloud security vs. reality: Test yourself |
| January | | |
| TechBeacon | 26 | 4 Data Privacy Compliance Articles You Should Read |
| Forbes | 24 | The Cost Of Non-Compliance: Mitigating Personal And Corporate Risk |
| TechNewsWorld | 10 | Research Finds Many Workers Now Value Trust Over Money |