When we talk about legacy security challenges and solutions, we can’t forget about our old friends email and phishing. Phishing has been around for over 20 years and is still one of the most effect attack paths to steal credential, exploit endpoints, and deploy malware. After 20 years, you’d think we could find effective solutions […]