Insights on User Risk and Enterprise Security
Expert analysis, emerging trends, and the latest product, feature, and company innovations from the team redefining how enterprises think about user risk.




Dune Security Is Now Available on AWS Marketplace
Dune Security is now available on AWS Marketplace, allowing enterprises to deploy User Adaptive Risk Management through AWS for faster protection against social engineering and insider threats.




Lateral Movement: How Attackers Expand Access After Initial Compromise
Lateral movement turns a single compromise into an enterprise-wide breach. Learn how attackers spread, why it evades detection, and how CISOs can contain it.




Dune Security and Reality Defender Partner to Stop AI-Generated Media Threats Targeting Enterprises
Deepfakes and AI-generated attacks are targeting employees faster than legacy tools can keep up. Dune Security and Reality Defender are partnering to deliver layered protection against these threats, combining real-time detection with user layer intelligence.
%202.avif)
%202.avif)


What Is Vishing? How Voice Phishing Works and How to Stop It
Vishing attacks use voice-based social engineering to bypass traditional defenses. Learn how attackers exploit urgency, trust, and AI-generated audio to trigger breaches – and what enterprises must do to stop them.




Third-Party Access Is the New Insider Threat
Third-party breaches now drive 30% of incidents. Learn how attackers use valid vendor credentials to move undetected, escalate access, and operate like insiders inside your network.
.avif)
.avif)


BEC Has Already Cost $55 Billion and AI Is Making It Worse
Business Email Compromise has already caused over $55 billion in losses. Now AI is scaling these attacks with deepfakes, voice clones, and urgent pretexts. Learn how modern BEC works and what CISOs can do to stop it.




How Ghost Students Are Exploiting College Enrollment Systems to Steal Federal Aid
Criminal fraud rings are targeting college aid systems with fake student identities. These scams use automation, identity theft, and AI to steal financial aid, lock out real students, and overwhelm public institutions. Here’s how it works and what security leaders in higher ed need to know.




How Employee Fatigue Drives Human Error in Cybersecurity
Employee fatigue fuels human error and cybersecurity breaches by creating behavioral blind spots attackers exploit through social engineering and cognitive overload. Replace static awareness training with adaptive, real-time protection built for enterprise-scale risk.




ChatGPT in the Wrong Hands: How AI is Being Used in Cybercrime
Generative AI is reshaping enterprise cybersecurity by targeting trust, behavior, and user access. Learn how AI-powered threats bypass static defenses and what CISOs must do to protect the human layer.
