Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
As long as it’s easy for bad actors to spoof brand domains and create fake websites,… Read More >
As long as it’s easy for bad actors to spoof brand domains and create fake websites, they’ll keep doing it. But AI-based online brand protection tools can help fight brand exploitation outside the perimeter. Key Points: Domain spoofing is an extremely common type of cyberattack, but man… Read More >
Small businesses may think the… Read More >
Small businesses may think they’re unlikely to suffer from online brand impersonation, but no company is immune to… Read More >
As pandemic-spurred remote working becomes a permanent arrangement for many organizations,… Read More >
As pandemic-spurred remote working becomes a permanent arrangement for many organizations, cloud-based web security gateways help to safeguard a distributed workforce and enforce compliance. Key Points: Although increases in remote working were initially due to the COVID-19 pandemic, many or… Read More >
451 Research analyst Scott Cra… Read More >
451 Research analyst Scott Crawford describes how IT organizations will increasingly leverage cloud security to safeguar… Read More >
While security organizations spend billions per year to improve email security, the proble… Read More >
While security organizations spend billions per year to improve email security, the problem seems to be getting worse faster than it is getting better. Learn about the 7 main reasons this is the case and what you can do to improve your organization’s protections. After recently publishing my b… Read More >
DMARC helps stop bad actors de… Read More >
DMARC helps stop bad actors delivering malicious emails that appear to come from your brand’s domain. It helps ens… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
Ransomware attacks have become larger and more sophisticated—and hackers are increasingly stealing sensitive information and threatening to publish it unless the ransom is paid. Key Points: More ransomware attacks are stealing sensitive inform…
Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide suggests that organizations are recognizing the value of the standard to combat brand impersonation in phishing emails. Key Points: The number of domains using …
Cyber threats are surging as employees work from home due to the COVID-19 pandemic, prompting cybersecurity insurers to reassess companies’ security measures—and potentially raise premiums. Key Points: Rising threats and an increase in r…
Security defenses are improving, but cybercriminals move faster than defenders, and the attack surface seems broader than ever. There are five reasons why enterprise security is so challenging. Why does it seem that the security profession is continu…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >