Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

Identification of phishing emails can be cumbersome, accomplished by rule-based filters, machine learning, user-submitted, and other automated analyses. User submission is the cheapest and easiest to implement but a much more time-intensive process, adding overhead to already burdened staff.
By
Cory Keller
January 7, 2025

All papers are copyrighted. No re-posting of papers is permitted

470x382_Research_Paper_gray.jpg