1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...

Nov 22, 2019 | O365 Security, | BEC, | Email Compromise, | Cloud Security
1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...
Nov 12, 2019 | Cloud Security, | Azure, | Azure Security
Using Application Security Groups Setting up infrastructure in Azure can, at times, seem quite daunting with all of the available options one can configure within each service. In this blog, we will...
Sep 25, 2019 | O365 Security, | Email Compromise, | business e-mail compromise, | Cloud Security
1.0 Introduction In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to...
Sep 4, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise, | Cloud Security
In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to discuss how BEC...
Aug 5, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise
The Unassuming Threat: Business E-Mail Compromise & Office 365 Vulnerabilities Business e-mail compromise (BEC) is a class of cyber-crime that is growing rapidly. Over the past five years, BEC...
Aug 4, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise
Across the globe, companies and organizations of all sizes have faced an increasing onslaught of the cyber-crime known as business e-mail compromise (BEC). Perpetrated by organized crime groups, BEC...
Jun 24, 2019
It is with great pleasure that I introduce you to the new blog from SecureSky. The SecureSky mission is to assist our clients in utilizing cloud-native and third-party technologies to accelerate...