Security, Threat Intelligence Hub

Threat Intelligence für die 99 % – Teil 6: Bauen Sie Ihre eigenen – Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Lesen Sie mehr dazu
Security, Email Security

Drei Dinge, die Sie auf der RSA Conference USA 2019 sehen sollten

Here is what to look for at this year’s big cybersecurity show. The upcoming RSA Conference USA 2019 taking place from March 4-8 at the Moscone Center in San Francisco will mark my 17th consecutive year of attendance! It seems like my first ye…

Lesen Sie mehr dazu
Security, Email Security

Der CISO wird 25 Jahre alt

How has the CISO function changed through the years? Having an executive team to manage specific functions of an organization goes back to the introduction of formalized businesses. In the United States it recorded that the oldest corporation is Har…

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Globale Angriffe nehmen immer mehr zu

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evidence to the contrary. Cybercriminals on the other hand, understand all too well that the Earth is actually boundaryless in cybersp…

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Threat Intelligence für die 99 % – Teil 8: Abschließende Gedanken & Takeaways

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

End-to-End-Migrationen ohne Ausfälle: Einfach, leicht zu merken

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to-vendor and now on-premises-to-cloud. While most of the version migrations were p…

Lesen Sie mehr dazu
Security, Email Security

Outlook und Office im Fadenkreuz der Phishing-Betrüger

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help with daily meal planning, weekly work planners, or even month wardrobe assistance. You can even now find phishing kits targeted to …

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

TechValidate-Umfrageergebnisse zeigen das Potenzial der Archivierungslösung von Mimecast

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers.…

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Threat Intelligence für die restlichen 99 % – Teil 7: Das fertige Puzzle

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Lesen Sie mehr dazu
Security, Security Awareness Training

Personifizierte Insider-Bedrohungen – Infiziert! Benutzer sollten wachsam sein.

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Lesen Sie mehr dazu
Security, Email Security

E-Mail-Sicherheit für die Gesundheitsbranche: Zeit für eine Vorsorgeuntersuchung?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Lesen Sie mehr dazu
Security, Email Security

Verhinderung von Attack-for-Hire-Diensten

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Threat Intelligence für die 99 Prozent – Teil 6: Bauen Sie Ihre eigenen – Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Lesen Sie mehr dazu
Security, Security Awareness Training

Fünf Wege, um das Bewusstsein für Cybersicherheit in Ihr Unternehmen zu integrieren

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Lesen Sie mehr dazu
Security, Email Security

Kaffee, Gebäck oder gestohlene Anmeldedaten?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Lesen Sie mehr dazu