Simulating Lateral Attacks Through Email

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

from Dark Reading: https://ubm.io/2DgMnay
via IFTTT