Einblicke zum Thema Cyber Resilience

JETZT ABONNIEREN

Threat Intelligence Hub
Phishing Kits: Saturating the Threat Landscape

High volume spam and phishing attacks are the new normal. Battling the onslaught requires … Read More >

High volume spam and phishing attacks are the new normal. Battling the onslaught requires awareness and a strategy. Key Points: Cybercriminals are using sophisticated phishing kits and automation to take cybercrime to a new level. Phishing kits produce convincing messages and sites that can fool ev… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted Aug 25, 2020

Schulungen zum Sicherheitsbewusstsein
Better Security Measures May Reduce Cyber Insurance Pre…

Fortifying your security with … Read More >

Fortifying your security with better controls, greater employee awareness, and a formal security budget could also lower… Read More >

Randi Gollin

by Randi Gollin

Posted Aug 21, 2020

Brand Protection
Getting to p=Reject, Mimecast’s Internal DMARC Project:…

A DMARC project goes well beyo… Read More >

A DMARC project goes well beyond just DNS administration; team structure and proper owned domain discovery, categorizati… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Aug 20, 2020

Threat Intelligence Hub
Bad Actors Target Media Industry with Impersonation Attacks

Impersonation attacks to spread disinformation through the media rose dramatically during … Read More >

Impersonation attacks to spread disinformation through the media rose dramatically during the first half of 2020. Key Points: Email impersonation attacks on news organizations and publishers have been steadily rising throughout 2020. Some of this is likely due to the coronavirus pandemic, since ne… Read More >

Mercedes Cardona

by Mercedes Cardona

Contributing Writer

Posted Aug 18, 2020

Brand Protection
Brand Impersonation: It Happens to Security Vendors, Too

Credential theft and revenue loss are cybercriminals’ goals when it comes to online … Read More >

Credential theft and revenue loss are cybercriminals’ goals when it comes to online brand spoofing, but a side effect is erosion of customer trust.  Key Points: Mimecast discovered a spoofed site for Check Point Software Technologies, a cybersecurity vendor. Attackers look for ways to pr… Read More >

Renatta Siewert

by Renatta Siewert

Senior Security Writer

Posted Aug 17, 2020

Office-365, Security Awareness Training, Email Security
Email Account Takeover Protection Strategies for Micros…

Here’s how to extend you… Read More >

Here’s how to extend your email security strategy for rapid detection and remediation of threats inside the perime… Read More >

Richard Botley

by Richard Botley

Senior Security Writer

Posted Aug 14, 2020

Popular Posts

Older Posts

E-Mail-Sicherheit

Reduce Dwell Time by Integrating Security Controls Via Open APIs

You can’t prevent every intrusion. But you can recognize and eradicate them sooner if your security tools work seamlessly together and share data via open, standardized APIs. Key Points: It takes nine months to identify and shut down the avera…

Read More >

Archiv und Datenschutz

How to Cut the Cost of E-discovery

Many organizations could significantly lower their e-discovery costs with risk-oriented upfront planning, better data management and an automated e-discovery solution. Key Points: Sharp increases in data production, compliance requirements and lawsu…

Read More >

Email Security, Archive and Data Protection, Security Awareness Training

McConnell Dowell’s High-Value Digital Transformation

How Mimecast’s cloud services helped the lean IT organization at a major construction company increase cyber resilience, support remote working, and deliver greater business value. Key Points: Mimecast’s suite of services, from archiving…

Read More >

Email Security, Security Awareness Training

Why artificial intelligence is key to improving phishing defenses

As attackers constantly evolve their tactics to side-step more traditional defenses, artificial intelligence and machine learning technologies are stepping in to help organizations improve defenses. Technologies like MessageControl offer a critical e…

Read More >

categories

Read More >

Mehr

Popular Posts