Page 80 - Cyber Defense eMagazine - September 2017
P. 80

page. At that point, the user is captured, and the hackers can do as they please, stealing data
               that then flows to attacker recipients over the network. Thus, only protection that extends across
               all three vectors can be effective. Defense calls for rapid web crawling to detect threats under
               construction; deep context and analysis of threat origin as to vector, type and targets; and the
               ability to strip and disable phishing links within messages, plus DNS-based live blocking and
               redirection—all vital elements of a successful anti-phishing defense strategy.



               Area  1  Security  is  the  first  and  only  cloud-based  company  to  deliver  preemptive  detection,
               analysis,  and  disruption  of  phishing  campaigns  across  the  email,  web,  and  network  vectors.
               Shutting down phishing attacks before they arrive at the network edge protects companies from
               such risks as BEC, ransomware, malware, credential harvesting sites and others.



               About the Author

               Blake Darche'

               Co-Founder & CSO, Area 1 Security

               www.area1security.com

               Blake  J.  Darché  is  a  Co-Founder  and  the
               Chief    Security   Officer   at   Area   1
               Security.  Prior to Area 1, Blake worked at
               CrowdStrike as a Principal Consultant, and
               at  the  National  Security  Agency  as  a
               Computer         Network       Exploitation
               Analyst.  Blake  holds  the  degree  Masters
               of Science in Security Informatics from The
               Johns Hopkins University and a Bachelors
               of Science in Information Technology from
               the Rochester Institute of Technology.

               Blake  has  built  his  career  across  a range
               of information security skill areas including
               experience     in   both    offense    and
               defense.  Blake  has  experience  in  Incident  Response,  Network  Analysis,  Malware  Analysis,
               Threat  Mitigation,  Threat  Intelligence,  Computer  Network  Operations  (CNO),  and  Counter
               Intelligence operations.    You can follow Mr. Darché on Twitter at @blakedarche.












                    80   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   75   76   77   78   79   80   81   82   83   84   85