Cyber Resilience Insights

NU ABONNEREN

Bewustwordingstraining
Mimecast Voices: Jennifer Odogwu

Editor's note: This is the first in a series of profiles featuring Mimecasters sharing the… Read More >

Editor's note: This is the first in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on prejudice and marginalization, and what actions people can take to better support their colleagues in this era of change and help drive a culture of inclusion i… Read More >

Joel Silverstein

by Joel Silverstein

Editor

Posted Jun 12, 2020

Bewustwordingstraining
Creative Hiring Can Help Solve the Cybersecurity Skills…

Hiring people from non-traditi… Read More >

Hiring people from non-traditional backgrounds may help you solve the chronic shortage of cybersecurity skills, while br… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted May 29, 2020

Security, Awareness Training
Managing Cyber Risk: Shore Up Your Weakest Link with Aw…

No matter how awesome your cyb… Read More >

No matter how awesome your cyber risk management program is, it can all go to hell in a single click without equally gre… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted Apr 22, 2020

Awareness Training, Threat Intelligence Hub, Coronavirus
Cyber Awareness: Top 3 Steps to Combat Cyber Disruption, Chaos and Profiteering

By now, COVID-19, or coronavirus, has likely dominated conversations and elicited new beh… Read More >

By now, COVID-19, or coronavirus, has likely dominated conversations and elicited new behavior at work, school, and home, given the rapid spread. But while we shift daily life and routines, the threat intelligence landscape is shifting as well: threat actors are taking advantage of the stressful an… Read More >

Renatta Siewert

by Renatta Siewert

Senior Security Writer

Posted Mar 13, 2020

Awareness Training, Threat Intelligence Hub
Why Deepfakes are Revolutionizing the World of Phishing

Since the dawn of social engineering, attack methodology has remained largely unchanged. B… Read More >

Since the dawn of social engineering, attack methodology has remained largely unchanged. But the rise in electronic communications and the departure from in-person interaction has changed this dynamic. BEC attacks rose in prominence, using email fraud to assail their targets via invoice scams and sp… Read More >

Jonathan Miles

by Jonathan Miles

Head of Strategic Intelligence and Security Research

Posted Oct 23, 2019

Continuity, Security, Cyber Resilience for Email, Awareness Training, Email Security
Internal Security Threats: A Problem that Continues to …

Mimecast’s “The St… Read More >

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and c… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Jul 15, 2019

Popular Posts

Older Posts

Security, Cyber Resilience for Email, Awareness Training, Email Security

E-mailaanvallen in het echte leven: Voorbeelden voor uw weerstandsstrategie

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Security report highlights some of the most alarming trends in the world of email security, but also examines how organizations are us…

Read More >

Security, Awareness Training

De opkomst van cyberbewustzijnstrainingen voor hedendaagse ondernemingen

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Read More >

Security, Awareness Training

Ga discreet te werk: de training cyberbewustwording voor werknemers

Make a plan for educating employees. Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what f…

Read More >

Security, Awareness Training

Gepersonaliseerde bedreigingen van insiders – geïnfecteerd, de gebruiker moet opletten

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Read More >

categories

Read More >

Meer info

Popular Posts