FAQs

Complete the form below to get started.

Why is impersonation so effective in social engineering attacks?
Which channels are most commonly used in impersonation attacks today?
Why are internal employees frequently impersonated?
How does generative AI increase impersonation risk?
Why do legacy security awareness programs struggle to prevent impersonation?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all
Senior executive seated alone in a dark office at night, reviewing a message on a smartphone, illustrating the risk of impersonation and executive-targeted social engineering attacks.

How Impersonation-Based Social Engineering Drives Enterprise Cyber Risk

Impersonation-based social engineering attacks are driving disproportionate enterprise risk. Learn why they work and what it takes to defend against them.

Blog
Blurred hospital corridor with multiple healthcare staff in scrubs walking and working, viewed from the center of the hallway. Red emergency lights glow overhead, conveying a busy, high-pressure clinical environment with active hospital operations.

Cybersecurity in Healthcare: How Social Engineers Target Patient Data and Hospital Operations

Healthcare’s reliance on digital systems and high-pressure clinical environments has made user risk a patient safety issue, and organizations must rethink how they prepare their workforce for modern attacks.

Blog

Dune Security's Revolutionary Approach: AI and Cybersecurity

Dune Security CEO David DellaPelle joins the Cyber Security America podcast to explain how AI-driven social engineering is outpacing traditional security awareness training and why organizations need a behavior-driven approach to identifying and reducing user risk.

Featured Podcasts

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.