Threat Intelligence Hub
The Mimecast Threat Intelligence Report
The Mimecast Threat Intelligence Report capitalizes on research conducted by the Mimecast Threat Center that provides analysis of 67 billion rejected emails. The research reinforces a previously observed trend: malware-centric campaigns are becoming increasingly sophisticated and complex, often using different pieces and types of malware in different phases of the attack. In addition, the resear...
Latest Threat Intelligence Blogs
Episode #12, Season 3 of Phishy Business: Closing the Cybersecurity Skills Gap Through Education and Opportunity
Together, Absa and the Maharishi Institute are consistently working to develop a sustainable means to give youth the training they need to maintain careers and break the cycle of poverty they have been born into. Our special guests are Shenaaz Abrahams, who has made it her mission to ensure the Absa Academy is giving the most marginalized in her community access to cybersecurity training, and one ...
Work Protected: World-Class Email Security with Total Deployment Flexibility
The Importance of Working Protected Workers need to feel secure when they are going about their day, conducting their business, and helping to grow and strengthen the organizations where they work. For today’s organization, providing security for workers goes far beyond just physical security, but must also apply to cybersecurity. Workers want to know they are protected from cybercriminals and th...
How to Work Protected from Today’s Advanced Email and Collaboration Security Threats
The world is continually changing. How we work is continually changing. Our need to work together to come up with the great ideas that drive business and advance humankind remains constant. Whether it was the first telephones used by businesses to connect their offices, the first computers that were networked to help researchers exchange ideas and information, or the amazing little computers and c...
Explore More Threat Intelligence Resources
Unfortunately we don't have any results matching your criteria, but you can try changing the selected filters above.
Find out how we can help you
tackle online threats
Get the latest threat intelligence information and resources from our Threat Center researchers who provide technical analysis of cyberattack campaigns, evolving threat landscapes as well as recommendations to help guide your cybersecurity practice.