Cyber Resilience Insights

SUBSCRIBE NOW

Security
GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valen… Read More >

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, but this year a group of cybercriminals have brought… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted Feb 14, 2019

Archiving
Feeling the Archive Love: TechValidate Survey Results

This Valentine’s Day, we… Read More >

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy … Read More >

Emily Wojcik

by Emily Wojcik

Senior Manager of Global Marketing Campaigns

Posted Feb 14, 2019

Security
Threat Intelligence for the 99 Percent - Part 7: Stitch…

How do you put all the threat … Read More >

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog serie… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Feb 13, 2019

Security
Insider Threats Personified – Infected, User Should Beware

When it comes to cybersecurity, human error can’t be discounted. We live in a mobil… Read More >

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee’s device outside of the office while using pub… Read More >

Monica Gupta

by Monica Gupta

Product Marketing Manager

Posted Feb 12, 2019

Security
Email Security for the Healthcare Industry: Time for a Checkup?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast&rsquo… Read More >

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusions from our aggregated ESRA test results that we h… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Product Marketing

Posted Feb 11, 2019

Security
Preventing Attack-for-Hire Services

It's a real thing. Here's how … Read More >

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Feb 11, 2019

Popular Posts

Older Posts

Security

Threat Intelligence for the 99 Percent - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More >

Security

5 Ways to Ingrain Cybersecurity Awareness into Your Business

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Read More >

Security

Coffee, Donuts or Stolen Credentials?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Read More >

Security

New Year, New Prices: Bridging the Cyber Divide

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Read More >

categories

Read More >

View More

Popular Posts