Share:

This week, the Cofense blog post, Invoice Themed Phishing Emails Are Spreading from Trusted Linkswas named 2020 Best Security Blog by Federal Information Security Educators (FISSEA). Founded in 1987, FISSEA is an organization run by and for federal government information security professionals to assist federal agencies in strengthening employee cybersecurity awareness and training programs. Each year – with dozens of entries in varied categories – FISSEA recognizes a best entry in the FISSEA Training Exercise ContestTo meet the criteria, training exercises must have a security theme and be a part of an organization’s current security training program. Judging is based on originality, security message and graphic concept

“We are honored to be recognized for our efforts to help companies find and remove phish in their environments,” said Michael CallahanCofense SVP of MarketingCofense believes that a comprehensive phishing detection and response program is key to stopping phishing attacks, and we appreciate that the FISSEA program continues to raise awareness of resources like our blog designed to educate on the latest phishing techniques. 

Our analyst (and winning blog post author), Kian Mahdavi, and his coworkers in the Phishing Defense Center (PDC), devote their time to identifying and stopping phishing attacks. In addition, they provide insightful information about the dangers of phishing and how threat actors succeed in evading standard defensesThey, and the 24-plus million customers in our community who report phish daily, make the difference in our mission to rid organizations worldwide of phishing attacks.  

Read the winning blog post here. 

All third-party trademarks referenced by Cofense whether in logo form, name form or product form, or otherwise, remain the property of their respective holders, and use of these trademarks in no way indicates any relationship between Cofense and the holders of the trademarks. Any observations contained in this blog regarding circumvention of end point protections are based on observations at a point in time based on a specific set of system configurations. Subsequent updates or different configurations may be effective at stopping these or similar threats. 
The Cofense® and PhishMe® names and logos, as well as any other Cofense product or service names or logos displayed on this blog are registered trademarks or trademarks of Cofense Inc.