Security, Email Security

Baltimore Ransomware-Angriff stellt Schwachstellen in der kommunalen IT-Sicherheit in den Fokus

Resource-thin IT departments need a plan for cyber resilience. A high-profile ransomware attack against the government of a major American city has brought new light on an ongoing cybersecurity quandary: how can those with the least resources defend…

Lesen Sie mehr dazu
Security, Email Security

Im Abwehr-Wettrüsten darf der Faktor Bequemlichkeit nicht vernachlässigt werden

How can we build smarter security systems? The arms race between attackers and defenders is constructive. It should lead to the detection of inefficient parts and production of more robust solutions help to improve systems. It is an unfortunate fact…

Lesen Sie mehr dazu
Security, Email Security

Wie ist der aktuelle Stand der E-Mail-Sicherheit weltweit?

Our third annual State of Email Security report is here. What is the current state of email security globally? Excellent question. The short answer, per the results of the Mimecast State of Email Security Report 2019 – is not good. Sorry to st…

Lesen Sie mehr dazu
Security, Email Security

Jede Organisation benötigt sichere Inhalte

Content theft remains a huge problem for all organizations. It seems that the only thing scarier for a Chief Information Security Officer, IT security professional or Security Operations Center than a marathon of Freddy Kruger movies is the theft or…

Lesen Sie mehr dazu
Security, Email Security

Fast die Hälfte aller Datenpannen geht auf das Konto von KMUs

Convince the cybersecurity skeptics with this and other data points. When you're making your case for cybersecurity solutions back to your business/finance colleagues at your small-to-medium sized organization, it's helpful to have cold, hard facts …

Lesen Sie mehr dazu
Security, Email Security

In welchem Umfang werden Cybersicherheitsverstößen zunehmen?

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to stop or mitigate the damage of cybersecurity breaches, the more they occur. And why should we expect anything different when the rewa…

Lesen Sie mehr dazu
Security, Email Security

Reicht die dynamische Analyse aus, um schwer fassbare Malware-Angriffe zu stoppen?

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you often hear about major malware infections and their impact, but rarely do you learn why these attacks were successful in the firs…

Lesen Sie mehr dazu
Security, Email Security, Brand Protection

Sicherheitsverstöße bei Fluglinien

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber…

Lesen Sie mehr dazu
Security, Email Security

Sicherheitstipps des US-amerikanischen Department of Homeland Security

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing…

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

Compliance-Kontrolle – keine einfach abzuhakende Aufgabe

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervision is one of the most important areas of investment for archiving buyers today but is also unfortunately one of the stagnant areas …

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Best Practices für die Bedrohungsanalyse für schlanke IT-Organisationen: Teil 2

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organization. In…

Lesen Sie mehr dazu
Security, Email Security

Sicherheit nach Vorbild der NSA

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Best Practices für die Bedrohungsanalyse für schlanke IT-Organisationen: Teil 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Lesen Sie mehr dazu