Security, Email Security

Nader bekeken: Verdoezelde bestandsloze malware in de toolkits van cyberaanvallers

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Meer informatie
Security, Email Security

De Baltimore ransomware-aanval markeert kwetsbaarheden in gemeentelijke IT-beveiliging

Resource-thin IT departments need a plan for cyber resilience. A high-profile ransomware attack against the government of a major American city has brought new light on an ongoing cybersecurity quandary: how can those with the least resources defend…

Meer informatie
Security, Email Security

Gemak en eenvoud om de beveiligingsrace te winnen

How can we build smarter security systems? The arms race between attackers and defenders is constructive. It should lead to the detection of inefficient parts and production of more robust solutions help to improve systems. It is an unfortunate fact…

Meer informatie
Security, Email Security

Wat is de huidige stand van zaken met betrekking tot e-mailbeveiliging?

Our third annual State of Email Security report is here. What is the current state of email security globally? Excellent question. The short answer, per the results of the Mimecast State of Email Security Report 2019 – is not good. Sorry to st…

Meer informatie
Security, Email Security

Elke organisatie heeft behoefte aan veilige informatie

Content theft remains a huge problem for all organizations. It seems that the only thing scarier for a Chief Information Security Officer, IT security professional or Security Operations Center than a marathon of Freddy Kruger movies is the theft or…

Meer informatie
Security, Email Security

Bijna de helft van alle inbreuken treffen kleine en middelgrote ondernemingen

Convince the cybersecurity skeptics with this and other data points. When you're making your case for cybersecurity solutions back to your business/finance colleagues at your small-to-medium sized organization, it's helpful to have cold, hard facts …

Meer informatie
Security, Email Security

Hoe kunnen we inschatten of de cyberinbreuken zullen toenemen?

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to stop or mitigate the damage of cybersecurity breaches, the more they occur. And why should we expect anything different when the rewa…

Meer informatie
Security, Email Security

Is dynamische analyse voldoende om hardnekkige malware-aanvallen te stoppen?

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you often hear about major malware infections and their impact, but rarely do you learn why these attacks were successful in the firs…

Meer informatie
Security, Threat Center

Luchtvaartmaatschappijen kampen met schendingen

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber…

Meer informatie
Security, Email Security

Beveiliging van het Department of Homeland Security Way

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing…

Meer informatie
Archiving, Data Protection

Toezicht op naleving: Meer dan het aanvinken van vakjes

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervision is one of the most important areas of investment for archiving buyers today but is also unfortunately one of the stagnant areas …

Meer informatie
Security, Threat Center

Dreigingsintelligentie de beste methodes voor slimme IT-afdelingen - Deel 2

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organization. In…

Meer informatie
Security, Email Security

Beveiligen zoals het NSA

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Meer informatie