Security

C-Level Fraud and Spear-Phishing Across International Boundaries

These long-standing cyberattack types are more prevalent than ever.   Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 8…

Read More
Security

Supply-Chain Attacks in the Real World: Bridging the Cyber Divide

Cyberattackers attempted to take down the US electric grid—through companies like yours. Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find you…

Read More
Security, Cyber Resilience for Email

Cybersecurity Trends: Our Most Read Blogs of 2019 Q1

See what caught the eyes of Cyber Resilience Insights readers this quarter. With the first quarter of 2019 drawing to a close, we wanted to provide you a one-stop shop for the most-read new content we've posted on Cyber Resilience Inights so far. Be…

Read More
Security

Information Security Through the Years

Some aspects of info security haven't changed much in theory. You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who…

Read More
Security, Office-365

Moving Email to the Cloud? Cyber Resilience is a Must

Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among…

Read More
Archiving

Your Success is Our Success: The Archiving Triple Crown

Customer success in archiving has produced fruitful results for all. It’s springtime in the US, and for many aficionados, the beginning of another season of horse racing. The Triple Crown is a rare accomplishment for the horse that wins the Ke…

Read More
Security

The Evolution of CISO Strategies

How has the CISO role changed through the years? Charles Darwin wrote “On the Origin of Species” in 1859 and introduced the concept that organisms arise and develop through the natural selection of small, inherited variations that increa…

Read More
Security

Use Your Discretion: Cyber Awareness Education for Employees

Make a plan for educating employees. Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what f…

Read More
Security

Cybersecurity Shows Demystified

Show season is upon us. Chief Information Security Officers, IT security professionals and hackers alike will be converging on cities around the globe to learn the latest and greatest cybersecurity trends, technologies and issues, while meeting thei…

Read More
Security

Addiction or Prevention

Have we become addicted to passwords? In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security pe…

Read More
Security

March Email Security Risk Assessment Report: A Focus on Office 365

What Office 365 misses may surprise you. With this blog I am happy to bring our 8th consecutive quarterly release of the Mimecast Email Security Risk Assessment (ESRA) aggregate report to your attention (also with an associated infographic). We now …

Read More
Security

Understanding Threat Intelligence: Seeing Beyond Indicators of Compromise

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicator…

Read More
Security

The Return of the Equation Editor Exploit – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CV…

Read More
Security

Sextortion, Bomb Threats and GoDaddy

The lurid details of a new kind of email scam. An award-winning film from 1989 titled “Sex, Lies and Videotape” introduced the world to the power of uncomfortable private data coming to public attention and now cybercriminals are taking …

Read More