chat
expand_more

Emily Burns

Emily Burns

Content Marketing Manager

Emily Burns is a Content Marketing Manager at Abnormal Security, where she collaborates on the strategy and execution of the Abnormal Blog, helping build brand awareness and strengthening Abnormal's position as a thought leader. She is an established writer and content strategist with expertise in creating short- and long-form content covering a wide range of topics, including B2B technology, cloud solutions, cybersecurity, e-commerce, fintech, higher education/academia, legal solutions, and more.

B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B MKT689 Cyber Savvy Open Graph Images
Discover how Alex Wood, CISO at Uplight, tackles evolving cybersecurity threats with AI-driven solutions.
Read More
B Osterman Recap
Discover key insights from Osterman Research’s latest report on modernizing MFA to tackle rising identity threats.
Read More
B Customers AI
Learn from Abnormal customers about the challenges of AI-enhanced attacks and discover why they trust AI-driven security solutions to stay ahead of these evolving threats.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B CSA Report
Discover how industry experts view and are preparing for AI’s evolving role in cybersecurity.
Read More
B MKT595 Cyber Savvy 4 Open Graph Images
Explore expert insights from Bernard Wright, CISO at ClearBank, on the evolving cybersecurity challenges and strategies to protect the financial sector.
Read More
B Seg Lessons
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Read More
B MKT530 Cyber Savvy 3 Open Graph Images
Discover how CIO Roger Morris protects popular restaurant brands, including Taco Bell, Whataburger, 7 Brew, and more, from cyber threats.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B MKT499 Images for Customer Blog Series
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Read More
B 1 29 23 AI Love
Discover why Abnormal customers trust an AI-powered solution to protect their organizations from advanced email attacks.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B 9 12 23 ATO
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Read More
B Fraud GPT
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
Read More
B 8 8 23 SEG Web
A secure email gateway (SEG) simply cannot defend your cloud email platform. Stop advanced threats with Abnormal Security. Here's what our customers have to say about ditching their SEGs.
Read More
B 8 1 23 ABM
See how Abuse Mailbox Automation provides organizations with an extra layer of security, helping security teams automate the user-reported phishing email workflow and identify malicious emails.
Read More
B 7 24 23 Worm GPT
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Read More
B 7 3 23 Q2 Blogs
Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
Read More
B Verizon
Discover the biggest takeaways about business email compromise and social engineering from the 2023 Verizon Data Breach Investigations Report (DBIR).
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to phishing attacks.
Read More
B 1500x1500 5 key takeaways L1 R1
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
Read More
Spam Blog Cover
As spammers become more sophisticated across cloud services, Abnormal is addressing new attacks including this recent malicious calendar invite.
Read More