?????????????? ???????????????? ?????????? ????????????????’?? ?????????? ???? ?????????????? ???????????????? ?? The ???? ???????????????????? ???? ?????????????? (DoD) has awarded its ?????????? ???????????????????? ???? ?????????????? ?????????????????to Jericho, a groundbreaking move that highlights how far artificial intelligence has come in protecting national security. Our mission at Jericho is to protect organizations from the evolving threat landscape through our ???????????????? ???????????????? ??????????????????????, ????????-???????? ???????? ??????????????????, ?????? ????-?????????????? ???????????? ?????????????????? ??????????. This recent development in the defense sector reaffirms our commitment to pioneering AI innovations that enhance security and resilience, not just for companies but potentially for national interests as well. We’re excited to be part of the next chapter in AI security. Here’s to a future where technology keeps us all safer! #Cybersecurity #AI #USA #JerichoSecurity #Innovation #NationalSecurity #Technology #Leadership
Jericho Security
数据安全软件产品
New York,NY 1,707 位关注者
Jericho Security is where generative AI meets cybersecurity
关于我们
Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks. We created our proprietary generative AI, CyberGPT, to simulate attacks, create new defenses and educate your teams about how to prevent serious losses from cyberattacks. With unparalleled expertise in sophisticated analytics and top-of-the-line educational frameworks, we are committed to defending others from the unimaginable scale and volume of attacks that only AI can unleash.
- 网站
-
https://jerichosecurity.com
Jericho Security的外部链接
- 所属行业
- 数据安全软件产品
- 规模
- 2-10 人
- 总部
- New York,NY
- 类型
- 私人持股
地点
-
主要
US,NY,New York
Jericho Security员工
-
Mark Carney
-
Scott Howitt
CISO/CIO/CTO/CDO, Advisor, Board Member, Investor
-
Steve Prewitt
AI Builder | Data Executive | Tech Investor | Start-up Advisor | Healthcare and Life Sciences | MBA
-
Nitin Raina
Chief Information Security Officer, Thoughtworks | Enterprise Risk | Board Advisor | Technology Executive | Leadership Coach | QTE
动态
-
???????? ?????????????? ???? ?????????? ????????????????? In today's digital age, spear phishing has evolved into a highly sophisticated threat, leveraging advanced tactics to deceive even the most vigilant individuals. Unlike traditional #phishing, which casts a wide net, spear phishing targets ???????????????? ?????????????????????? or ??????????????????????????, often using personalized information to appear #legitimate. ??? ?????? ?????????????????????????????? ???? ???????????? ?????????? ???????????????? ??????????????: - ??????????????????????????????: Attackers gather detailed information about their targets, including names, job titles, and recent activities, to craft convincing messages. - ?????? ???? ????: Generative AI enables hackers to quickly create phishing emails that mimic legitimate communications, making them harder to detect. - ???????????????????????? ???? ?????????????? ??????????????: Cybercriminals may compromise email accounts of known contacts, sending malicious messages that appear to come from trusted individuals. - ?????????????????? ???? ??????????: Some attacks involve QR codes that, when scanned, lead to phishing websites or initiate malware downloads. By understanding the sophisticated nature of modern spear phishing attacks, we can better #protect ourselves and our organizations from potential breaches. *??.??. ????????? ?????? ???? ?????????????? ??????????! **???? ?????? ????????? ?????? ??????????'???? ???????? ???????????? ???? ??????? ???????????
-
Head Of Planning, Economics & IT Department at DDR&D (MAFAT) | Open Innovation| Dual-Use Technologies | Globes 40Under40
#DefenseTech is Reaching New Heights ?? ?? The Big Picture: DefenseTech spans a wide range of innovations, from dual-use technologies to specialized products and capabilities designed for defense applications. In today’s world, almost any technology can be adapted for defense purposes. If you have a defense client, you’re already part of this dynamic and evolving community. ?? Why It Matters: The landscape is shifting rapidly. From the perspective of operational users to investors and beyond, the demand for cutting-edge solutions is growing stronger every day. The environment for innovation has never been more promising. ?? Now’s the Time: Thinking about launching a DefenseTech startup? There’s no better time than now. Defense budgets are climbing, the demand for advanced technologies to enhance national security is intensifying, and investors are more open than ever to supporting DefenseTech ventures. ?? Examples of Success: ? Helsing: Redefining AI in defense. ? Anduril Industries: Pioneering autonomous defense solutions. ? Saronic Technologies: Breaking barriers with advanced tech and ASV. ? Jericho Security: Making history with the United States Department of Defense, securing the first-ever generative AI defense contract for AI-powered threat detection. ?? Dive Deeper: Check out insights from Chris Metinko and Crunchbase for more on the exciting rise of DefenseTech - https://lnkd.in/dSiYpxXv #DefenseTech #Innovation #Startups #NationalSecurity #AI #VentureCapital #DefenseInnovation
-
?????? ???????? ???? ??????????-?????????????? ???????????????? ?? #Phishing attacks have evolved far beyond email. Today, ??????????-?????????????? ???????????????? —spanning SMS, social media, and collaboration tools—is becoming a serious concern for organizations. New tactics like SMS-Phishing, QR Phishing and Hybrid Phishing (using multiple channels at the same time) are becoming more common. In Q2 2024, there was a stunning ????% ???????????????? ???? ???????????????????? ???????????????? at bypassing Secure Email Gateway (SEG) systems. What makes multi-channel phishing so successful is that they target ????????????, not security systems. As companies bolster their frontline #defenses in the form of Multi-Factor Authentication, Zero Trust Security systems and Enhanced Threat Detection and Response frameworks (e.g., SIEM/SOAR), security awareness and training (SAT) solutions must adapt accordingly as well. In the modern #cyber landscape, an effective SAT solution encompasses ?????????? ???????? ???????????????????? that can be ???????????? ???????????????????? ???????? ???????????????? ????????????????????, proactively changing behaviors and building a culture of vigilance. Simply looking at metrics like phishing click rates, that only provide a narrow view of human behavior, is no longer enough. There must be a shift towards incorporating ???????????????????? and ??????????-???????? ?????????????? that ensure security training is both relevant and impactful. At Jericho, we offer ?????????????? ???????????????? to handle all your training needs. From designing programs to deploying engaging, relevant content, we ensure your team stays vigilant and prepared—so you can focus on what you do best. Interested in finding out more? Request for a demo here: https://lnkd.in/e92mkHyP #Cybersecurity
-
?????? ???????????????? ?????????????????? ???????????????? ???? ??????-???????????????????? ??? Is ???????????????? ?????????????????? ???????????????? truly impactful, or are technical controls enough to protect an organization? Some argue that #technology—firewalls, endpoint security, and newly developed AI-powered tools—can shoulder the load. But here’s the reality: ???? ?????????????????? ?????????????? ?????? ?????????? ?????????????? ?????? ?????????? ??????????????????????????. ???????????????? ??????????????? Humans are the target. ???????????? ??????????????????????? No firewall can intercept it. ?????????????? ??????????????? Awareness is the key. Security training isn’t just an add-on; it’s the bridge that strengthens your team—the first line of defense. Without it, even the best tech can be undone by one uninformed click. At Jericho Security, we’ve seen how tailored, engaging, and relevant training can ???????????? ???????? ?????? ?????????????????? ?????????????????? ???????? ???????????????? ??????????????????. It’s not just about compliance; it’s about building a culture of vigilance. CISOs, the question isn’t if training is essential—it’s how effectively you’re delivering it. Is your team ready? Let’s discuss: what’s been your most effective approach to security training? ?? #Cybersecurity #phishing #security
-
Check out our CEO Sage Wohns intro video on Sagetap ?
?? Meet the founders behind this AI-powered cybersecurity training platform for employees: Co-founded by serial entrepreneurs Sage Wohns and Tim Hwang, Jericho Security aims to protect enterprises from the emerging threats of generative AI. Sage Wohns, CEO, previously co-founded Agolo, pioneering in AI for finance and news, and led Multilingual Engineering at Rakuten. Tim Hwang, Chairman, also serves as the founder and CEO of FiscalNote, raising over $300 million in venture capital. Together, they founded Jericho Security to leverage their expertise in AI to protect people from the new wave of threats created by GenAI. Jericho Security is designed to empower enterprise cybersecurity teams with dynamic AIs that can keep pace with the new threats created by generative platforms. Jericho Security uses generative adversarial networks to detect and simulate threats in real time. With seamless integration and no code required, it provides robust, invisible security for your teams. Here is why brands choose them: 1. Generate dynamic threat simulations based on real-world attacks to test your team’s vulnerabilities. 2. Create relevant training to educate your team about the latest threats. For more information, check out the founder video below and anonymously connect with the team on Sagetap today.
Jericho Security - CEO Intro
https://vimeo.com/
-
?? ???????????????????? ???????????????? ??????????????????????: ???????? ?????????????????? #Phishing remains a top cyber threat, targeting the human risk element of security. The ability to automate phishing simulations is a game-changer, offering scalability, real-world relevance, and actionable insights to help organizations build resilience. ???????????????????? ???? ???????????????????? ???????????????? ??????????????????????: 1. Simulate ????????-?????????? ??????????????, including spear-phishing and credential theft, to prepare employees for evolving threats. 2. Ensure consistency and reach across the organization. 3. Provide immediate, ???????????????? ???????????????? when employees interact with simulated attacks to boost learning. 4.Foster a culture of learning, not punishment, to encourage reporting and engagement. 5. Use ???????????????? ?????????????????? to refine strategies, tracking metrics like click-through rates and reporting accuracy. As the number of data breaches involving the human element reaches ????% ???? ???????? (Forbes), efforts to manage this significant threat must adapt accordingly. #Cybersecurity #Automation #JerichoSecurity #HumanRiskManagement
-
?? ???????????????? ?????????????? ???? ???????????????? #Phishing attacks are more sophisticated than ever. Here’s what’s trending—and why it’s critical for CISOs to stay ahead: ?? ??????????-?????????? ??????????????: A new campaign is spreading Remcos malware through seemingly legitimate Excel files. These malicious attachments are designed to evade basic security checks, requiring heightened vigilance and more advanced threat detection. ?? ???????????????????? ??????????-????????????????: A Chinese national has been charged for a years-long spear-phishing campaign targeting U.S. government entities and private businesses. This case underscores the ongoing risk from nation-state actors, highlighting the need for tailored defenses against high-level phishing. ?? ???????????? ?????????? ???????????????? ????????: Attackers are exploiting developer trust with new tools that impersonate GitHub logins. This technique targets credentials and could give attackers access to sensitive repositories, underscoring the importance of securing developer environments. ?? ?????????????? ?????????????????? ??????????: Many companies are slow to report phishing incidents. This lag creates significant risks, potentially leading to undetected breaches, regulatory penalties, and reputational damage. With phishing tactics evolving, ????????-????????, ????????-???????????????? ???????????????? is a must to keep employees aware of the latest threats. Building a resilient defense against these targeted attacks is a priority for CISOs looking to safeguard both company assets and reputation in today's risk-saturated world. #CISO #Cybersecurity #ThreatIntelligence
-
?? ?????????????????????????? ???? ????+ ??????????????????—?????????????? ???????????????? ??????????????’?? ???? ???????? ???? ?????????????????????? With Jericho Security, #global teams can access security training and phishing simulations in over ???? ??????????????????, ensuring that everyone receives training in their preferred language. Whether your team is in Taiwan, S?o Paulo, Dubai, or beyond, we’ve got you covered with localized, accessible training. Because protecting your organization means equipping every employee, everywhere, anytime. ?? Check out what we do here: https://lnkd.in/gSFSnc44 #Cybersecurity #Language #Phishing #Employee
-
Are your employees your strongest security asset? Or your ???????????????? ????????? With Jericho's ????????-???????? ???????????????? ?????????? ????????????????, get the data to know for sure! ?? Identify high-risk users instantly ?? Tailor training to each employee’s needs ?? Turn training into real, measurable defense Don't guess—get insights that protect. Click to ?????????? ????????: https://lnkd.in/gnV7HHiw #Cybersecurity #Employee #JerichoSecurity #Risk #Data
Jericho Security | Employee Performance Analytics
jerichosecurity.com