Threat Intelligence Hub
The Mimecast Threat Intelligence Report
The Mimecast Threat Intelligence Report capitalizes on research conducted by the Mimecast Threat Center that provides analysis of 67 billion rejected emails. The research reinforces a previously observed trend: malware-centric campaigns are becoming increasingly sophisticated and complex, often using different pieces and types of malware in different phases of the attack. In addition, the resear...
Latest Threat Intelligence Blogs
SIEM vs. Log Management
Cybersecurity has never been more important for businesses to take seriously. According to an IBM report, it takes a company around 200 days to identify a security threat and 75 days to contain it. The same report says that the number of data breaches and cyberattacks increased by around 15% in 2021, with the average breach costing about $4.35 million. Cyberattackers are increasingly becoming mor...
Best Practices for Secure Backups and Archives
Backing up and archiving data are essential business requirements. There are both legal and practical reasons for data retention — ranging from regulatory compliance to the risk of a cyberattack that could lead to downtime or even business failure. The challenges are on the rise in today’s increasingly complex business environment, as increased data sharing and collaboration elevate already signif...
Building Security Information and Event Management (SIEM) Use Cases
As your organization grows, so does the need to monitor and protect your network. A security information and event management (SIEM) system can give you visibility into activity on your network and help you detect and respond to threats. There are many different ways to use SIEM, depending on the specific needs of your organization. In this article, we'll explore the importance of SIEM applicatio...
Explore More Threat Intelligence Resources
Unfortunately we don't have any results matching your criteria, but you can try changing the selected filters above.
Find out how we can help you
tackle online threats
Get the latest threat intelligence information and resources from our Threat Center researchers who provide technical analysis of cyberattack campaigns, evolving threat landscapes as well as recommendations to help guide your cybersecurity practice.