Creating Active Feedback Loops to Detect Advanced Attacks

March 1, 2021

Abnormal Security prides itself on its differentiated technology and superior efficacy when it comes to stopping advanced email attacks. Despite the overwhelming effectiveness of our platform, like all advanced AI systems, we may occasionally miss attacks or incorrectly flag safe messages.

In line with our value of customer-centricity, our objective is to make the customer experience for reporting these messages as seamless as possible. Additionally, per our value of velocity, we strive to make rapid changes to the system and allow our detection engine to benefit from more data, thereby creating a positive feedback loop that further drives detection efficacy in the future.

To better align with these objectives, we have revamped our user experience for reporting incorrectly flagged messages. Our new Detection 360° tab in the Portal navigation bar provides a consolidated view where customers can report messages and view prior reports and status updates. In addition to this redesign for increased user friendliness, we also have new cards with general detection statistics and the ability to filter reports on status and date, which adds convenience and visibility into the consistent improvements of our AI engine.

Active feedback dashboard

We hope this added functionality provides confidence in our AI systems and the degree to which we use customer feedback to ensure we are always increasing performance. Such improvements are critical as we continue our quest to detect and remediate every advanced, harmful email attack that targets our customers’ environments.

To learn more about our Abnormal platform and see it for yourself, request a demo today.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More