Page 80 - Cyber Defense eMagazine - September 2017
P. 80
page. At that point, the user is captured, and the hackers can do as they please, stealing data
that then flows to attacker recipients over the network. Thus, only protection that extends across
all three vectors can be effective. Defense calls for rapid web crawling to detect threats under
construction; deep context and analysis of threat origin as to vector, type and targets; and the
ability to strip and disable phishing links within messages, plus DNS-based live blocking and
redirection—all vital elements of a successful anti-phishing defense strategy.
Area 1 Security is the first and only cloud-based company to deliver preemptive detection,
analysis, and disruption of phishing campaigns across the email, web, and network vectors.
Shutting down phishing attacks before they arrive at the network edge protects companies from
such risks as BEC, ransomware, malware, credential harvesting sites and others.
About the Author
Blake Darche'
Co-Founder & CSO, Area 1 Security
www.area1security.com
Blake J. Darché is a Co-Founder and the
Chief Security Officer at Area 1
Security. Prior to Area 1, Blake worked at
CrowdStrike as a Principal Consultant, and
at the National Security Agency as a
Computer Network Exploitation
Analyst. Blake holds the degree Masters
of Science in Security Informatics from The
Johns Hopkins University and a Bachelors
of Science in Information Technology from
the Rochester Institute of Technology.
Blake has built his career across a range
of information security skill areas including
experience in both offense and
defense. Blake has experience in Incident Response, Network Analysis, Malware Analysis,
Threat Mitigation, Threat Intelligence, Computer Network Operations (CNO), and Counter
Intelligence operations. You can follow Mr. Darché on Twitter at @blakedarche.
80 Cyber Defense eMagazine – September 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.