Darktrace annonce son intention d'acquérir Cado Security.
Lire le communiqué de presse
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
L'entreprise
CARRIÈRES
Leadership
Actualités
Fédéral
Investisseurs
Académie
Légal
SDR Academy
À propos de nous
Contacter
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
McLaren
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Register now
Darktrace / Email blog
Email under attack
Darktrace experts share news and findings about the threat landscape affecting the inbox.
Latest blog posts
Blog
Malicious Use of Dropbox in Phishing Attacks
Understand the tactics of phishing attacks that exploit Dropbox and learn how to recognize and mitigate these emerging cybersecurity threats.
Blog
Navigating Email Security Gaps Beyond DMARC
Discover Darktrace's strategies for navigating email security gaps beyond DMARC. Enhance your defenses with advanced threat detection and mitigation.
Blog
Utilizing AI Security Against Phishing Campaigns
Learn how Darktrace leveraged generative AI tools to detect and combat phishing email campaigns. Discover how AI is reshaping cybersecurity strategies.
Blog
How Darktrace SOC Thwarted a BEC Attack
Discover how Darktrace's SOC detected and stopped a Business Email Compromise in a customer's SaaS environment.
Blog
Understanding Email Security & the Psychology of Trust
We explore how psychological research into the nature of trust relates to our relationship with technology - and what that means for AI solutions.
Blog
How Darktrace Foiled QR Code Phishing
Explore Darktrace's successful detection of QR code phishing. Understand the methods used to thwart these sophisticated cyber threats.
Blog
Breaking Down "ICES": An Umbrella Term With Wide Variety
Integrated Cloud Email Security (ICES) can be an effective email security solution, but Darktrace/Email's self-learning AI should be your solution of choice.
Blog
Boosting Security Posture with Email Integration
Protect your organization from cyber-attacks with a strong security strategy. Learn how to safeguard against threats targeting email, cloud apps, and beyond.
Blog
Detecting Malicious Email Activity & AI Impersonating
Discover how two different phishing attempts from some known and unknown senders used a payroll diversion and credential sealing box link to harm users.
Blog
Enhancing Security Teams with AI-Powered Email Solutions
Discover email-based attack challenges & how AI security solutions can tackle these attacks with autonomous action, optimized workflows, and user visibility.
Blog
Email Security & Future Innovations: Educating Employees
As online attackers change to targeted and sophisticated attacks, Darktrace stresses the importance of protection and utilizing steady verification codes.
Blog
Bytesize Security: A Guide to HTML Phishing Attachments
Darktrace guides you through the common signs of HTML phishing attachments, including common phishing emails, clever impersonations, fake webpages, and more.
Previous
Use Cases
Phishing
Ransomware
Supply Chain Attacks
Account Takeover
Blog
Customer Stories
Integrations
Get a demo
Your data. Our AI.
Elevate your email security with Darktrace AI
Get a demo