Web Security

Browser Isolation: An Essential New Web Security Layer

Key Points: Browser isolation is an additional security layer that protects people, systems, and networks by completely separating them from dangerous sites and their malicious content. Cloud-based, server-side, containerized browser isolation offer…

Read More
Email Security, Web Security

Integrating Security Products is Vital for Cyber Resilience

The pace of tech innovation combined with the cyber arms race means integrating cybersecurity products is essential to keep up with fast-evolving threats. Open APIs are key. Key points: The ability to rapidly integrate best-of-breed security produc…

Read More
Email Security

Ransomware Outbreak Threatens All Industries

A surge in ransomware attacks increases the challenges for organizations that are already struggling to cope with the COVID-19 pandemic. Key Points: Reports of ransomware attacks rose sharply in the first half of 2020, and the outbreak is considered…

Read More
Email Security, Security Awareness Training

Managing Third-Party Cyber Security Risks

Cyber attacks via third parties pose a huge and often unrecognized security risk to companies of all sizes. Fortunately, there are steps that you can take to minimize the risk. Key Points: Although direct cyberattacks on organizations get most of th…

Read More
Brand Protection

How Your Brand May Be Exploited Without Your Knowledge

Organizations may not be aware of all the ways that bad actors are impersonating their brand online, even though those online exploitation attacks can defraud an organization’s customers and tarnish its brand. Key Points: Cybercriminals can ex…

Read More
Email Security, Security Awareness Training

Why SMBs Are Under-Prepared for Cyberattacks

Smaller companies are not as well prepared for cyberattacks than bigger enterprises, in part due to budget limitations. Cloud-based security tools and awareness training can help. Key Points: Small and mid-sized businesses (SMBs) are targeted in 43%…

Read More
Web Security

Managing Security for a Remote Workforce: Mimecast IT’s Experience

Two Mimecast IT and internal security leaders share what they’ve learned about managing and securing a massive increase in employee remote working since the start of the COVID-19 pandemic. Key Points: The shift to remote working means it&rsquo…

Read More
Security Awareness Training

Twitter Hack Highlights Need for Security Awareness Training

A social engineering attack enabled hackers to penetrate Twitter’s administrative systems and hijack high-profile accounts, illustrating the far-reaching impact of cybersecurity lapses. Key points Authorities are probing a Twitter hack that hi…

Read More
Brand Protection

Getting to p=Reject, Mimecast’s Internal DMARC Project: Part 1

Creating a DMARC record and setting it to p=Reject would seem to be very easy. It can be – but there are several considerations, such as learning who your “good email spoofers” are and how to keep their delivery high, while stopping…

Read More
Email Security

Hubris Caught the Instagram Star: Business Email Compromise Security Guide

Here are four email security hacks you can learn from the Hushpuppi saga, such as practicing sound social media judgment and ensuring your customers and supply chains are equally secure. Ramon Olorunwa Abbas, a.k.a. “Ray Hushpuppi” is all…

Read More
Threat Intelligence Hub

Mimecast Discovers MPP Bleed, a Microsoft Project Vulnerability

New Mimecast research demonstrates how CVE-2020-1322 potentially impacts Microsoft Project– included in the Microsoft Office suite – that can lead to unintended information disclosure. Editor’s note: Thanks to Mimecast Research Labs…

Read More
Threat Intelligence Hub

Malicious Deepfake Technology: A Growing Cyber Threat

Be aware: Attackers now have the capability to clone real people’s voices to increase the success of business email compromise attacks and sway public opinion. Key Points: Malicious actors are using AI-based deepfake audio impersonations to en…

Read More
Threat Intelligence Hub

Mimecast Discovers “3D Office Exploiter,” a Remote Code Execution Vulnerability in Microsoft Office

New Mimecast research demonstrates how CVE-2020-1321 potentially impacts unpatched versions of Microsoft Office for Windows and Mac. Editor’s note: Thanks to Mimecast Research Labs’ Menahem Breuer and Ariel Koren for this discovery. Mimec…

Read More
Email Security

Why Manufacturers Are Under-Prepared for Cyber Resilience

As manufacturers transition to industry 4.0, they are increasingly vulnerable to cyber threats—but they are less prepared than other sectors. Key Points: Manufacturers are increasingly exposed to cybersecurity risks—but a survey shows th…

Read More
Email Security

Steve Wozniak Opens Up at the Mimecast Cyber Resilience Summit

The Apple co-founder shares his views on innovation, AI, cybersecurity, business ethics and giving back to society in a fascinating Q&A with Mimecast CEO Peter Bauer.    Silicon Valley icon discusses how to instill an ethical approach …

Read More
Security Awareness Training

Cyber Awareness Training Helps Defend Users from Brand Spoofing Attacks

Users may be more likely to fall for phishing emails that appear to come from trusted brands. Regular awareness training can help transform them into eagle-eyed threat detectors. Key Points: Bad actors often send email messages that impersonate bran…

Read More
Archive and Data Protection

Why E-discovery Is Now a Ubiquitous Requirement

Runaway growth in data, together with increasing regulation and workplace litigation, are making e-discovery a universal requirement among all sizes of organization. Key Points: The enormous expansion in business data, combined with the prevalence o…

Read More
Brand Protection

On Your DMARC: Protecting MS 365 Email Users from Phishing Scams

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email-based scams. However, the protocol can be difficult to implement; third-party tools can help. Key Points: Email is easy to spoof and MS 365’s enormous c…

Read More
Email Security

How Cybersecurity Automation Transformed ZeroFOX’s SOC

Internally sharing info on how the cybersecurity automation software works enables SOC analysts to cut work down from days to hours—or even less. Key Points: Research shows cybersecurity automation is on the rise, despite obstacles like a shor…

Read More