Cyber Resilience Insights

SUBSCRIBE NOW

Office-365, Email Security
On Your DMARC: Protecting MS 365 Email Users from Phishing Scams

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email… Read More >

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email-based scams. However, the protocol can be difficult to implement; third-party tools can help. Key Points: Email is easy to spoof and MS 365’s enormous customer base makes it an inviting target for scamm… Read More >

Elliot Kass

by Elliot Kass

Contributing Writer

Posted Jul 02, 2020

Security, Threat Center
How Cybersecurity Automation Transformed ZeroFOX’s SOC

Internally sharing info on how… Read More >

Internally sharing info on how the cybersecurity automation software works enables SOC analysts to cut work down from da… Read More >

Mike Azzara

by Mike Azzara

Contributing Writer

Posted Jul 01, 2020

Awareness Training, Security Awareness Training
Mimecast Voices: Bryan Vermes

Editor's note: This is the sec… Read More >

Editor's note: This is the second article in a series of profiles featuring Mimecasters sharing their personal experienc… Read More >

Joel Silverstein

by Joel Silverstein

Editor

Posted Jun 30, 2020

Security, Email Security
Using AI to Fight Domain Spoofing for Online Brand Protection

As long as it’s easy for bad actors to spoof brand domains and create fake websites,… Read More >

As long as it’s easy for bad actors to spoof brand domains and create fake websites, they’ll keep doing it. But AI-based online brand protection tools can help fight brand exploitation outside the perimeter. Key Points: Domain spoofing is an extremely common type of cyberattack, but man… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted Jun 26, 2020

Security, Email Security
Why Online Brand Protection Is Important for Small Businesses

Small businesses may think they’re unlikely to suffer from online brand impersonatio… Read More >

Small businesses may think they’re unlikely to suffer from online brand impersonation, but no company is immune to the threat. Key Points: Online brand impersonation is a widespread problem that can damage a company’s reputation and cause financial losses for its customers and other con… Read More >

Allan Halcrow

by Allan Halcrow

Posted Jun 25, 2020

Security, Web Security
Shift to Remote Working Makes Web Security Gateways Vit…

As pandemic-spurred remote wor… Read More >

As pandemic-spurred remote working becomes a permanent arrangement for many organizations, cloud-based web security gate… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted Jun 23, 2020

Popular Posts

Older Posts

Archiving, Data Protection

Ready or Not, Here Comes California’s Data Privacy Law

Businesses worldwide face a July 1 deadline to comply with the California Consumer Privacy Act (CCPA). If your organization isn’t ready, now is the time to start. Key Points: On July 1, California begins to enforce the strictest data privacy l…

Read More >

Security, Web Security

Security’s “New Normal”: Remote Working Supercharges the Shift to Cloud Security

451 Research analyst Scott Crawford describes how IT organizations will increasingly leverage cloud security to safeguard more widely distributed people, assets, and networks. Key Points: The long-term increase in remote working and the growth in co…

Read More >

Email Security, Data Protection, Office-365

Critical IT Continuity Planning for a Secure Microsoft 365 National Health Service

As the UK’s National Health Service embraces Microsoft 365 security and productivity services, there are lessons from WannaCry and Exchange Online downtime for protecting critical national infrastructure. In a time when effective healthcare has…

Read More >

Archiving, Data Protection

Get Ready to Play Offense On E-Discovery

The cost and disruption of e-discovery—particularly email discovery—are spiraling up. Play offense on e-discovery to manage those fire drills instead of letting them manage you. Key Points: IT departments are constantly forced to react t…

Read More >

categories

Read More >

View More

Popular Posts