Security, Email Security

3 Things to See at RSA Conference USA 2019

Here is what to look for at this year’s big cybersecurity show. The upcoming RSA Conference USA 2019 taking place from March 4-8 at the Moscone Center in San Francisco will mark my 17th consecutive year of attendance! It seems like my first ye…

Read More
Security, Email Security

CISO at 25

How has the CISO function changed through the years? Having an executive team to manage specific functions of an organization goes back to the introduction of formalized businesses. In the United States it recorded that the oldest corporation is Har…

Read More
Security, Threat Center

Global Attacks Abound

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evidence to the contrary. Cybercriminals on the other hand, understand all too well that the Earth is actually boundaryless in cybersp…

Read More
Security, Threat Center

Threat Intelligence for the 99 Percent - Part 8: Final Thoughts & Takeaways

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Read More
Archiving, Data Protection

Zero-Down, End-to-End Migrations: Simple, Easy to Remember

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to-vendor and now on-premises-to-cloud. While most of the version migrations were p…

Read More
Security, Email Security

Phishing for Outlook

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help with daily meal planning, weekly work planners, or even month wardrobe assistance. You can even now find phishing kits targeted to …

Read More
Security, Threat Center

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Read More
Archiving, Data Protection

Feeling the Archive Love: TechValidate Survey Results

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers.…

Read More
Security, Threat Center

Threat Intelligence for the 99 Percent - Part 7: Stitching It Together

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Read More
Security, Awareness Training

Insider Threats Personified – Infected, User Should Beware

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Read More
Security, Email Security

Email Security for the Healthcare Industry: Time for a Checkup?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Read More
Security, Email Security

Preventing Attack-for-Hire Services

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Read More
Security, Threat Center

Threat Intelligence for the 99 Percent - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More
Security

Threat Intelligence for the 99% - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More
Security, Awareness Training

5 Ways to Ingrain Cybersecurity Awareness into Your Business

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Read More