Cyber Resilience Insights

NU ABONNEREN

Email Security, Data Protection, Office-365
Critical IT Continuity Planning for a Secure Microsoft 365 National Health Service

As the UK’s National Health Service embraces Microsoft 365 security and productivity… Read More >

As the UK’s National Health Service embraces Microsoft 365 security and productivity services, there are lessons from WannaCry and Exchange Online downtime for protecting critical national infrastructure. In a time when effective healthcare has become the number one global priority, it’s… Read More >

Richard Botley

by Richard Botley

Senior Security Writer

Posted Jun 18, 2020

Security, Email Security
Why Email Security Never Seems to Improve, and What You…

While security organizations s… Read More >

While security organizations spend billions per year to improve email security, the problem seems to be getting worse fa… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Jun 16, 2020

Security, Email Security
Why DMARC is Essential for Online Brand Protection

DMARC helps stop bad actors de… Read More >

DMARC helps stop bad actors delivering malicious emails that appear to come from your brand’s domain. It helps ens… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted Jun 15, 2020

Email Security, Threat Intelligence Hub
Ransomware Attack Leaves Honda Stuck in "Park"

A large-scale ransomware attack on Honda Motor Co. halts manufacturing operations, highlig… Read More >

A large-scale ransomware attack on Honda Motor Co. halts manufacturing operations, highlighting the need to better protect business critical systems. Key Points Honda announced a ransomware attack crippled operations in multiple countries, causing factories to shut down temporarily and disrupting … Read More >

Mercedes Cardona

by Mercedes Cardona

Contributing Writer

Posted Jun 11, 2020

Security, Email Security
Companies Wake Up to The Value of DMARC for Online Brand Protection

Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide s… Read More >

Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide suggests that organizations are recognizing the value of the standard to combat brand impersonation in phishing emails. Key Points: The number of domains using DMARC tripled to nearly 2 million in 2019. Adoptio… Read More >

Mike Faden

by Mike Faden

Contributing Writer

Posted Jun 09, 2020

Security, Email Security
Why Cybersecurity Never Seems to Improve, and What You …

Security defenses are improvin… Read More >

Security defenses are improving, but cybercriminals move faster than defenders, and the attack surface seems broader tha… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Jun 03, 2020

Popular Posts

Older Posts

Security, Email Security

Understanding Online Brand Exploitation and Its Consequences

Online brand exploitation is a very real—and complex—cybersecurity issue. A multi-faceted online brand protection strategy can help brands protect themselves and their customers. Key Points: Brand exploitation is a highly complex—a…

Read More >

E-mailbeveiliging

Want Cyber Resilience? Integrate Email Security into Your SIEM

Integrating email security data with Security Information and Event Management (SIEM) systems can help organizations respond faster to attacks and increase cyber resilience. Key Points: Email is an excellent early warning system for cyberattacks, be…

Read More >

E-mailbeveiliging

Defense in Depth for Microsoft 365

Microsoft Office 365 has some good email security features, but also some significant vulnerabilities. A defense in depth strategy can compensate for these weaknesses, and create a more secure email environment. Key Points: Microsoft offers several …

Read More >

E-mailbeveiliging

Credential Theft via Email Phishing: Its Rise, Risks, and Solutions

Credential theft is rampant and dangerous—but you can protect your organization and users by taking steps to stop email phishing attacks and password reuse. Key Points: Credential theft continues at extremely high levels as malicious actors ta…

Read More >

categories

Read More >

Meer info

Popular Posts