Cyber Resilience Insights

SUBSCRIBE NOW

Security
Threat Intelligence for the 99% - Part 3: When Is It Needed?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest editi… Read More >

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat intelligence (CTI) program. When thinking about the… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Jan 16, 2019

Security
Insider Threats Personified – Part 3: Patient Zero Un-H…

Sometimes, bad things happen t… Read More >

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’… Read More >

Monica Gupta

by Monica Gupta

Product Marketing Manager

Posted Jan 15, 2019

Security
Survey: Cybersecurity at Work, By the Numbers

Findings of our survey show th… Read More >

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest … Read More >

Michael Madon

by Michael Madon

SVP & GM of Mimecast Security Awareness

Posted Jan 15, 2019

Security
Cryptojackers Strike Again

No organization is exempt from cryptojackers. It doesn’t even matter if your organi… Read More >

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cryptojacking Revisited For those of you who still d… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jan 14, 2019

Security
Mimecast Discovers Microsoft Office Product Vulnerability CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory… Read More >

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data files, customer reports of false positives, Microsoft … Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Product Marketing

Posted Jan 08, 2019

Security
Threat Intelligence for the 99% - Part 2: Why is it Imp…

The need for threat intelligen… Read More >

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog se… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Jan 08, 2019

Popular Posts

Older Posts

Security

2019 Cybersecurity Trends to Watch

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Read More >

Security

Threat Intelligence for the 99% - Part 1: Explaining the Issue

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Read More >

Security

Why Employees Habits are Cyber Risks

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Read More >

Security

2018 Year in Review

It is amazing how fast it feels as if 2018 has flown past us. Despite the fact that every year is the same number of months, weeks, days and hours, it feels as if somehow 2018 disappeared in a wink. This is due in large part to the amazing this tha…

Read More >

categories

Read More >

View More

Popular Posts