cover image of CISO Guide to Vendor email compromise white paper

CISO Guide to Vendor Email Compromise (VEC)

Vendor email compromise (VEC) is a significant security threat to enterprise organisations. This form of attack occurs when a threat actor gains control of a vendor email account and then uses it to steal money from known contacts.

In this white paper from Dr. Eric Cole at Secure Anchor, learn how attackers leverage compromised accounts from vendors or partners to launch attacks that are specifically designed to bypass traditional email security.

Vendor email compromise (VEC) is a significant security threat to enterprise organizations. This form of attack occurs when a threat actor gains control of a vendor email account and then uses it to steal money from known contacts.

In this white paper from Dr. Eric Cole at Secure Anchor, learn how attackers leverage compromised accounts from vendors or partners to launch attacks that are specifically designed to bypass traditional email security.

What to expect?

  • Discover the various types of attacks launched from compromised vendors
  • Learn how these attacks are bypassing traditional email security
  • Understand which tools you can leverage to stop these attacks and protect your organisation today


Fill out the form to receive your copy of the CISO Guide to Vendor Email Compromise (VEC) today.

Get your copy of the CISO Guide to VeC!