Cyber Resilience Insights

SUBSCRIBE NOW

Email Security
Bad Guys with Good Algorithms: 5 Ways Cybercriminals Can Exploit AI

The bad news is cybercriminals are leveraging AI to supercharge their attacks. Learn how t… Read More >

The bad news is cybercriminals are leveraging AI to supercharge their attacks. Learn how they do it in order to build better cybersecurity defenses. Key Points: AI is emerging as a driver of new, more advanced cybersecurity threats. Bad actors can harness AI to deliver more intelligent, adaptable m… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Nov 27, 2020

Email Security
Cyberattacks Grow More Targeted in the Time of COVID

The pandemic has changed busin… Read More >

The pandemic has changed business and workplace dynamics, and bad actors are using these changes to pursue new avenues o… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted Nov 20, 2020

Email Security, Threat Intelligence Hub
Anatomy of a Sustained BEC Attack on Microsoft 365 Users

Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to … Read More >

Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then to prevent detection of their email compromise. Key Points: A recent global business email compromise campaign, now under investigation by the FBI, diverted at least $15 million an… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted Nov 17, 2020

Email Security, Brand Protection
Getting to p=Reject, Mimecast’s Internal DMARC Project:…

Mimecast’s now completed… Read More >

Mimecast’s now completed DMARC project highlights examples of attacks that were stopped using a combination of DMA… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Nov 16, 2020

Email Security
AI and Cybersecurity: The Need for a New Mindset

As the use of advanced AI in cyberattacks increases, cybersecurity organizations must get … Read More >

As the use of advanced AI in cyberattacks increases, cybersecurity organizations must get more creative to outsmart the bad guys. Key Points: Cyber adversaries are increasingly adept and creative in the application of AI to fuel their attacks. Incorporating new AI capabilities into cybersecurity op… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Nov 10, 2020

Email Security
Companies Large & Small Consider 5G Opportunities — and…

5G networks are rolling out wo… Read More >

5G networks are rolling out worldwide, and many companies could end up running their IT networks on 5G. But can they mak… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Nov 03, 2020

Popular Posts

Older Posts

Email Security, Threat Intelligence Hub

Threat Intelligence Briefing: Pandemic Fallout Strains Cybersecurity and Resilience

All organizations’ cybersecurity resilience is in greater peril as the global COVID-19 pandemic continues to add to and reshape cyber risk. Key Points: Pandemic fallout such as businesses accelerating their cloud migrations, more work from hom…

Read More >

Email Security

FBI Warns of Healthcare Ransomware: What Hospitals Can Do

Like wearing a mask and washing your hands, following a few proven cybersecurity best practices can boost resilience to ransomware for all organizations. Key Points: Surging ransomware attacks continue to target healthcare facilities. Cybersecurity …

Read More >

Email Security

Crowdstrike-Mimecast Integration Boosts Enterprise Cybersecurity

Organizations need deep email threat intelligence that is integrated with endpoint detection so identification, prevention and responses to threats are connected, orchestrated and automated. Key Points: Most organizations use a combination of SIEM a…

Read More >

Email Security

Defending AI in the Adversarial Environment

AI — in cybersecurity and in general — is vulnerable to adversarial attacks. Here’s why, plus some defense strategies to increase your cyber resilience. Key Points: Organizations and their cybersecurity functions are increasingly d…

Read More >

categories

Read More >

View More

Popular Posts