Security, Threat Intelligence Hub

Dreigingsintelligentie voor de 99% - Deel 6: Werk uw eigen strategie uit - Hulpmiddelen

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Meer informatie
Security, Email Security

3 niet te missen dingen op de RSA Conference USA 2019

Here is what to look for at this year’s big cybersecurity show. The upcoming RSA Conference USA 2019 taking place from March 4-8 at the Moscone Center in San Francisco will mark my 17th consecutive year of attendance! It seems like my first ye…

Meer informatie
Security, Email Security

CISO op 25

How has the CISO function changed through the years? Having an executive team to manage specific functions of an organization goes back to the introduction of formalized businesses. In the United States it recorded that the oldest corporation is Har…

Meer informatie
Security, Threat Intelligence Hub

Wereldwijde aanvallen doen zich dagelijks voor

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evidence to the contrary. Cybercriminals on the other hand, understand all too well that the Earth is actually boundaryless in cybersp…

Meer informatie
Security, Threat Intelligence Hub

Dreigingsinformatie voor de 99 procent - Deel 8: Laatste overwegingen & tips

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Meer informatie
Archiving, Archive and Data Protection

Zero-Down, End-to-End-migraties: eenvoudig te onthouden

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to-vendor and now on-premises-to-cloud. While most of the version migrations were p…

Meer informatie
Security, Email Security

Phishing voor Outlook

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help with daily meal planning, weekly work planners, or even month wardrobe assistance. You can even now find phishing kits targeted to …

Meer informatie
Security, Threat Intelligence Hub

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Meer informatie
Archiving, Archive and Data Protection

Met aandacht voor archivering: de onderzoeksresultaten van TechValidate

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers.…

Meer informatie
Security, Threat Intelligence Hub

Dreigingsintelligentie voor de 99% - Deel 7: Het volledige plaatje

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Meer informatie
Security, Security Awareness Training

Gepersonaliseerde bedreigingen van insiders – geïnfecteerd, de gebruiker moet opletten

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Meer informatie
Security, Email Security

E-mailbeveiliging voor de gezondheidszorg: is het tijd voor een controle?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Meer informatie
Security, Email Security

Voorkom Attack-for-Hire-diensten

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Meer informatie
Security, Threat Intelligence Hub

Threat Intelligence voor de 99% - Deel 6: Bepaal uw eigen hulpmiddelen

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Meer informatie
Security, Security Awareness Training

5 manieren om bewustzijn rond cyberveiligheid in uw bedrijf te introduceren

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Meer informatie
Security, Email Security

Koffie, donuts of gestolen inloggegevens?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Meer informatie