Security, Threat Center
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Maintaining compliance has always been a top-of-mind concern for highly regulated industri… Read More >
Maintaining compliance has always been a top-of-mind concern for highly regulated industries. In the face of increasing regulatory frameworks and evolving security threats, it’s no surprise that compliance is becoming more critical universally. Perhaps no other industry faces more stringent … Read More >
In IT terms, five years is a l… Read More >
In IT terms, five years is a lifetime. In the last five years I’ve gone from covering enterprise archiving as an … Read More >
On January 1, 2020, the stat… Read More >
On January 1, 2020, the state of California’s new regulatory requirement for data privacy - the California Consu… Read More >
Why data over-sharing is making you an easier phishing target We live in a world where sha… Read More >
Why data over-sharing is making you an easier phishing target We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the rise, growing to nearly 41% in 2018. But data sharin… Read More >
Threat intelligence teams know that cyberattacks are most frequently conducted via email, … Read More >
Threat intelligence teams know that cyberattacks are most frequently conducted via email, and they know many simple attacks can be successful with the right blend of human error and obfuscated malware in compressed file formats. On top of this industry fact, Mimecast researchers uncovered data from… Read More >
Reducing compliance nightmares… Read More >
Reducing compliance nightmares, data loss horror stories and other terrifying cyberthreats to avoid Dev… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
Editor’s note: Elad Schulman is the co-founder and CEO of Segasec, and a speaker at the Cyber Resilience Summit in Dallas, October 28-30. Awareness of the cyber skills gap has grown in lockstep with the gap itself in recent…
“I really like the concept of cyber resilience because it genuinely helps explain what businesses need to do: detect, respond, and recover in the shortest possible amount of time.” Next week, cybersecurity experts from all around th…
Since the dawn of social engineering, attack methodology has remained largely unchanged. But the rise in electronic communications and the departure from in-person interaction has changed this dynamic. BEC attacks rose in prominence, using email frau…
The Cyber Resilience Summit in Dallas on October 28-30 is just around the corner, and the speakers have been hard at work preparing sessions on how to get the most of Mimecast, how to build true company-wide resilience against information risk and cy…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >