8 ‘Must-Haves’ that Today’s Security Policies Need to Include

As we’ve blogged about previously, the security response to phishing … share of time on identifying potential security threats, but less time gathering … from the growing number of sophisticated zero-hour phishing threats on the web.