Einblicke zum Thema Cyber Resilience

JETZT ABONNIEREN

Awareness Training
Creative Hiring Can Help Solve the Cybersecurity Skills Shortage

Hiring people from non-traditional backgrounds may help you solve the chronic shortage of … Read More >

Hiring people from non-traditional backgrounds may help you solve the chronic shortage of cybersecurity skills, while bringing in fresh perspectives that can enhance cyber resilience. Key Points: A more creative approach to hiring can help address the severe shortage of skilled cybersecurity profes… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted May 29, 2020

E-Mail-Sicherheit
Want Cyber Resilience? Integrate Email Security into Yo…

Integrating email security dat… Read More >

Integrating email security data with Security Information and Event Management (SIEM) systems can help organizations res… Read More >

Mitch Wagner

by Mitch Wagner

Contributing Writer

Posted May 28, 2020

E-Mail-Sicherheit
Defense in Depth for Microsoft 365

Microsoft Office 365 has some … Read More >

Microsoft Office 365 has some good email security features, but also some significant vulnerabilities. A defense in dept… Read More >

Elliot Kass

by Elliot Kass

Contributing Writer

Posted May 27, 2020

E-Mail-Sicherheit
Credential Theft via Email Phishing: Its Rise, Risks, and Solutions

Credential theft is rampant and dangerous—but you can protect your organization and … Read More >

Credential theft is rampant and dangerous—but you can protect your organization and users by taking steps to stop email phishing attacks and password reuse. Key Points: Credential theft continues at extremely high levels as malicious actors take advantage of users’ top concerns, such as… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted May 21, 2020

E-Mail-Sicherheit
Making Sure Your Third-Party Email Services use DMARC

Third-party email services help businesses conduct essential communications. They may also… Read More >

Third-party email services help businesses conduct essential communications. They may also open the door for malicious email impersonation attempts.   Key Points: Many organizations use valuable third-party services to regularly communicate with customers, prospects, clients, suppliers, and mo… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted May 20, 2020

Threat Intelligence Hub
Shoring Up Brand Protections in the Age of Domain Spoof…

Cybercriminals leverage the tr… Read More >

Cybercriminals leverage the trust and digital reputations that online brands have fostered to further their malicious em… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted May 19, 2020

Popular Posts

Older Posts

E-Mail-Sicherheit

Why Government Organizations Need DMARC

Cybercriminals often spoof government email addresses. Enforcing DMARC can help governments protect citizens—and workers—from malicious email impersonation attempts. Key Points: Governments increasingly rely on email to communicate with …

Read More >

Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Attackers Target Employees Returning to Work—and Increasingly Turn to Non-Traditional Attack Vectors

Key Points: Attackers are shifting focus to target employees returning to work. Non-traditional attack vectors, including vishing and deepfake audio, are on the rise. Mimecast detected a spike in attacks on healthcare organizations, with malicious …

Read More >

E-Mail-Sicherheit

Sharing Threat Intelligence Among Best-of-Breed Security Tools

Cybersecurity tools need to share threat intelligence, using open Application Programming Interfaces (APIs), to effectively defend against cyberattacks.  Key Points: Even the best security tools cannot adequately defend the organization when th…

Read More >

E-Mail-Sicherheit

The Growing Risk of Gift Card Scams

Business email compromise (BEC) scams that involve gift cards usually aren’t very sophisticated—but employees often still fall for them. Key Points: Gift card scams are a growing form of business email compromise attack that thieves use …

Read More >

categories

Read More >

Mehr

Popular Posts