Cyber Resilience Insights

SUBSCRIBE NOW

Security
Will Broadcom-Symantec Deal Leave Cybersecurity Customers in the Lurch?

Cybersecurity industry consolidation creates potential risk for organizations Cybersecuri… Read More >

Cybersecurity industry consolidation creates potential risk for organizations Cybersecurity experts have spoken – Broadcom’s pending $10.7 billion acquisition of Symantec’s enterprise security business doesn’t bode well for Symantec enterprise customers, particularly because… Read More >

Joel Silverstein

by Joel Silverstein

Senior Manager, Content Strategy

Posted Aug 22, 2019

Security
Cyber Resilience Summit to feature five education track…

Practical Advice for Advancing… Read More >

Practical Advice for Advancing Your Security Programs What do threat intelligence, securing Office 365, brand spoofing,… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Aug 23, 2019

Security
Healthcare phishing attacks are increasing disruption a…

74% of healthcare institutions… Read More >

74% of healthcare institutions experienced a security incident last year; More than 30 million patient records compromis… Read More >

Miranda Nolan

by Miranda Nolan

Marketing Intern

Posted Aug 20, 2019

Security
Threat Intelligence Report: Cybercriminal Go-To-Market Strategies

Mass market vs. targeted marketing: Techniques and technology behind these two strategies … Read More >

Mass market vs. targeted marketing: Techniques and technology behind these two strategies Do cybercriminals have different go-to-market strategies? Does this strike you as a weird question to ask? Don’t only legitimate organizations have market strategies? In my view, given that most cybercri… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Aug 15, 2019

Security
“The State of Email Security 2019” – Email-Borne Threats Lead Directly to Data Loss

The Real Cost of Data Loss and Why it Hurts so Much When digital data or sensitive conten… Read More >

The Real Cost of Data Loss and Why it Hurts so Much When digital data or sensitive content falls into the wrong hands, it really is lost for good. The role of email in such loss events are a key part of the recently released "The State of Email Security Report 2019" from Mimecast. Due to its digita… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Aug 08, 2019

Security
13 Tips for Good Cyber Hygiene at Black Hat and DEF CON…

Black Hat and DEF CON are two… Read More >

Black Hat and DEF CON are two seminal cybersecurity and hacker events that showcase the latest devices and capabilities… Read More >

Carl Wearn

by Carl Wearn

Posted Jul 26, 2019

Popular Posts

Older Posts

Security

Phishing Attacks on File-Sharing Services Show Sharing Isn’t Always Caring

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  There are multiple ways in which attackers abuse the convenience of cloud-based services in our current cyber landscape. In my latest research, which I will be pres…

Read More >

Security

3 Keys to Advanced Threat Protection

How should your organization deal with Advanced Threat Protection?  Every IT security professional and their Chief Information Security Officer, understands Advanced Threat Protection is a key competent to a successful security infrastructure. C…

Read More >

Security

New Phishing Attack Emerges using SHTML file attachments

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April, the Mimecast Threat Center team was alerted to a rare type of server-parsed HTML (SHTML) based phishing attack emerging from the…

Read More >

Continuity, Security, Cyber Resilience for Email, Awareness Training

Internal Security Threats: A Problem that Continues to Get Worse

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and careless users Most organizations are heavily focused on protecting their organizations from inbound attacks coming directly from c…

Read More >

categories

Read More >

View More

Popular Posts