

Your Email Security Questions, Answered
Beginner guides, industry trends, and ready-to-use email security templates from Armorblox. Meant for curious newbies, experienced security teams, and everyone in between.
Explore Topics
Select a topic to learn more.
Business Email Compromise
Everything you need to know about protecting your organization from BEC attacks.
Videos
What is Business Email Compromise (BEC)?
What Is Business Email Compromise?
What Is Business Email Compromise? A Definitive Guide to BEC
Blog
How to Spot Payroll Diversion Fraud: When Direct Deposits Go Rogue
Blog
FBI 2021 IC3 Report Key Findings: Billions Lost in BEC Scams
Blog
5 Types of Payment Fraud and How to Reduce Your Exposure Risk
Blog
Armorblox Named Sample Vendor in 2021 Gartner Hype Cycle for Midsize Enterprises
GPT
What you need to know about GPT and how it benefits security teams.
GPT
What Is A Generative Pre-trained Transformer? A Definitive Guide to GPT
Blog
How ChatGPT Will Change Cybersecurity Forever
Blog
Is ChatGPT a Security Risk?
Blog
Protecting Critical Business Workflows in the Age of ChatGPT
Blog
Tackling the Rise of Generative Email Attacks: A Guide for Cybersecurity Professionals
Blog
Combating Phishing Attacks with AI and LLM: Protecting Your Business from Social Engineering
Vendor Email Compromise
Learn more about vendor email compromise.
Vendor Email Compromise
What Is Vendor Email Compromise? A Guide to VEC | Armorblox
Blog
How Vendor Email Compromise Works
Blog
Watch Out for These 4 Vendor Fraud Red Flags
Videos
Stop Vendor Email Compromise
Blog
Prevent Vendor and Supply Chain Attacks with Armorblox
Templates
Understanding Vendor Fraud and Supply Chain Risk
Blog
Blox Tales #4: Vendor Email Fraud + Office 365 Credential Phishing
Spear Phishing
Learn about guarding against phishing attacks (no spears required).
Spear Phishing 101: What It Is and How to Prevent It
Spear Phishing 101: What It Is and How to Prevent It
Blog
Phishing Attacks: Why Does Everyone Still Fall for Them?
Blog
What Is Credential Stuffing (And How Do You Stop It)?
Blog
OK Google, Build Me a Phishing Campaign
Webinars
The Science of Spear Phishing Attacks
Blog
SolarWinds Scammers Launch Spear Phishing Campaign Spoofing US Agency
Ransomware
Not if, but when. Protect your organization from growing ransomware threats.
Preventing Ransomware
Ransomware 101: What It Is & How to Prevent It
Blog
How Does a Ransomware Attack Work?
Blog
FBI Reports on OnePercent Ransomware Delivered Through Phishing Emails
Blog
How to Protect Against the Dangers of Malicious Email Attachments
Blog
A Ransomware Incident Response Guide for Your Business
Blog
How Does Ransomware Spread?
Vishing
How to identify and protect against targeted (and dangerous) voice phishing scams.
Email DLP
Malicious or accidental? Learn about the types and signs of email data loss and how to prevent them.
Tools and Templates
Ready-to-use resources to help you with cyberattacks.
Trusted Email Security for Your Cloud Office
Prevent targeted attacks and data loss over email and other cloud office applications.
