Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
The bad news is cybercriminals are leveraging AI to supercharge their attacks. Learn how t… Read More >
The bad news is cybercriminals are leveraging AI to supercharge their attacks. Learn how they do it in order to build better cybersecurity defenses. Key Points: AI is emerging as a driver of new, more advanced cybersecurity threats. Bad actors can harness AI to deliver more intelligent, adaptable m… Read More >
Cybersecurity awareness traini… Read More >
Cybersecurity awareness training is key to security and resilience as more employees shop at home on corporate-issued de… Read More >
National privacy policy is on the agenda in Washington, a stricter California policy is ap… Read More >
National privacy policy is on the agenda in Washington, a stricter California policy is approved by voters, and other states are poised to act. Key Points: Many businesses favor a national privacy policy rather than patchwork state policies. The incoming Biden administration is open to instituting … Read More >
The pandemic has changed busin… Read More >
The pandemic has changed business and workplace dynamics, and bad actors are using these changes to pursue new avenues o… Read More >
For the sixth consecutive year, Mimecast Cloud Archive clinched a spot in Gartner’s … Read More >
For the sixth consecutive year, Mimecast Cloud Archive clinched a spot in Gartner’s Enterprise Information archiving Magic Quadrant. Here’s why we earned it and where we’re going next. Cloud archiving is of growing importance, and organizations need solutions with scalability, flex… Read More >
Cyberattackers lurked in victi… Read More >
Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then t… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
Mimecast’s now completed DMARC project highlights examples of attacks that were stopped using a combination of DMARC, for the email portion of the attack, and Mimecast’s Brand Exploit Protect for the malicious website detection and takedo…
Cybercriminals took advantage of this year’s Amazon Prime Day to rev up credential harvesting, phishing attacks and brand impersonation. Is this a precursor to the upcoming holiday shopping season? It is no secret that cybercriminals lov…
The COVID-19 pandemic has created new legal risks that make e-discovery more valuable than ever. Key Points: &nbs…
As the use of advanced AI in cyberattacks increases, cybersecurity organizations must get more creative to outsmart the bad guys. Key Points: Cyber adversaries are increasingly adept and creative in the application of AI to fuel their attacks. Incor…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >