Cyber Resilience Insights

SUBSCRIBE NOW

Email Account Takeover Protection Strategies for Microsoft 365

Here’s how to extend your email security strategy for rapid detection and remediatio… Read More >

Here’s how to extend your email security strategy for rapid detection and remediation of threats inside the perimeter of your Exchange Online cloud-based gateway. Email account takeover attacks are hardly new but as cloud services surge in popularity, the risks of a data leak or financial frau… Read More >

Richard Botley

by Richard Botley

Senior Security Writer

Posted Aug 14, 2020

Email Security
Reduce Dwell Time by Integrating Security Controls Via …

You can’t prevent every … Read More >

You can’t prevent every intrusion. But you can recognize and eradicate them sooner if your security tools work sea… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted Aug 13, 2020

Archive and Data Protection
How to Cut the Cost of E-discovery

Many organizations could signi… Read More >

Many organizations could significantly lower their e-discovery costs with risk-oriented upfront planning, better data ma… Read More >

Allan Halcrow

by Allan Halcrow

Contributing Writer

Posted Aug 11, 2020

Email Security, Archive and Data Protection, Security Awareness Training
McConnell Dowell’s High-Value Digital Transformation

How Mimecast’s cloud services helped the lean IT organization at a major constructio… Read More >

How Mimecast’s cloud services helped the lean IT organization at a major construction company increase cyber resilience, support remote working, and deliver greater business value. Key Points: Mimecast’s suite of services, from archiving to email security and awareness training, has hel… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted Aug 10, 2020

Email Security, Security Awareness Training
Why artificial intelligence is key to improving phishing defenses

As attackers constantly evolve their tactics to side-step more traditional defenses, artif… Read More >

As attackers constantly evolve their tactics to side-step more traditional defenses, artificial intelligence and machine learning technologies are stepping in to help organizations improve defenses. Technologies like MessageControl offer a critical extra layer of protection, especially when fully in… Read More >

Dan Sloshberg

by Dan Sloshberg

Sr. Product Marketing Director

Posted Aug 06, 2020

Threat Intelligence Hub
Post-Pandemic Cyberattacks Target Vulnerable Industries

Cybercriminals are targeting i… Read More >

Cybercriminals are targeting industries like retail and manufacturing that continued to operate throughout coronavirus s… Read More >

Mercedes Cardona

by Mercedes Cardona

Contributing Writer

Posted Aug 05, 2020

Popular Posts

Older Posts

Threat Intelligence Hub

New Threat Intelligence Report: Black Hat USA Edition 2020

The Mimecast Threat Center analyzed 195 billion emails January-June 2020 (rejecting 92 billion or 47%) to compile insights in Mimecast's latest threat intelligence report. With the COVID-19 pandemic, cybercriminals shifted their focus to business ver…

Read More >

Security Awareness Training

The Role of Executive Training in Building Cybersecurity Culture

Key Points: A Wall Street Journal survey found that companies that provide cybersecurity training to executives are also more likely to have put other key cybersecurity protections in place.   Executive security awareness training may help non-…

Read More >

Web Security

Browser Isolation: An Essential New Web Security Layer

Key Points: Browser isolation is an additional security layer that protects people, systems, and networks by completely separating them from dangerous sites and their malicious content. Cloud-based, server-side, containerized browser isolation offer…

Read More >

Email Security, Web Security

Integrating Security Products is Vital for Cyber Resilience

The pace of tech innovation combined with the cyber arms race means integrating cybersecurity products is essential to keep up with fast-evolving threats. Open APIs are key. Key points: The ability to rapidly integrate best-of-breed security produc…

Read More >

categories

Read More >

View More

Popular Posts