Blog

Revoke Document Access: Auto-Expire and Re-Assign Permissions Remotely

June 07, 2024 / in Blog / by Zafar Khan, RPost CEO

If an information leak is not seen, is there a reportable breach?

You probably spent the bulk of your workweek wondering ‘where Armand will turn up Friday.’ If not, I understand 🤣 At any rate, I’ll end the suspense right here. I’m coming to you from the Black Forest in southeastern Germany—home of numerous fir trees and the distinctive (and delicious) chocolate and cherry cake that is one of my favorites. 

How to Prevent, Detect, and Disarm Attacks Targeting Your Email Account

May 31, 2024 / in Blog / by Zafar Khan, RPost CEO

You (Electronic Fraudster) Ain’t Nothin’ but a Hound Dog.

Armand, the RPost brand ambassador armadillo, here, coming to you from lovely Memphis, the birthplace of rock-and-roll and the locale for the late King of Rock’s family home, which has been in the news recently for all sorts of bad reasons.

Entering a Wave of Cybercriminal Impostor Chaos the World has Never Seen

May 24, 2024 / in Blog / by Zafar Khan, RPost CEO

Armand in Scotland at Night.

Armand here, RPost’s Armadillo product evangelist, hailing this week from wet and rainy Scotland (it rained a lot this week!). I’m here at the Association of Corporate Counsel Europe annual conference, discussing cyber-risk and sharing step-by-step how cybercriminals are orchestrating their attacks. 

See the Unseen: Eavesdrop on the Cybercriminal Eavesdroppers

May 17, 2024 / in Blog / by Zafar Khan, RPost CEO

We’re at the Beginning of a Wave of Cybercriminal Impostor Chaos that the World Has Never Seen.

Armand here, with my AI generated clone, back with the Oracle of Omaha. We’re here to discuss today, what is coming right now…

RPost’s PRE-Crime Analytical AI Service Can Be An Affordable Weapon in the Cyberscam Arms Race

May 10, 2024 / in Blog / by Zafar Khan, RPost CEO

Beware of the Yahoo Boys. They’re not as fun as they sound.

Armand here coming to you from lovely Omaha (where the Indian food is surprisingly good by the way). Over the last few Tech Essentials, we highlighted how cybercriminals can understand precisely who, when, and how to target their victims.