Abnormal Blog

Emily Burns
Content Marketing Manager
Emily Burns is a Content Marketing Manager at Abnormal Security, where she collaborates on the strategy and execution of the Abnormal Blog, helping build brand awareness and strengthening Abnormal's position as a thought leader. She is an established writer and content strategist with expertise in creating short- and long-form content covering a wide range of topics, including B2B technology, cloud solutions, cybersecurity, e-commerce, fintech, higher education/academia, legal solutions, and more.
AI is another tool to combat cybersecurity threats. We dive into common uses and challenges of AI in cybersecurity and how Abnormal Security can help.
Discover the most common types of phishing attacks and their impacts. Learn how cybercriminals exploit deception to compromise security and steal sensitive information.
Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
Learn how to evaluate transparency, risks, scalability, and ethical considerations to make informed cybersecurity decisions.
Learn how AI-driven automation boosts SOC productivity by reducing false positives, addressing skills gaps, and enhancing threat detection. Discover strategies to future-proof your SOC and strengthen cybersecurity defenses.
Explore insights from Brian Markham, CISO at EAB, as he discusses cybersecurity challenges, building trust in education, adapting to AI threats, and his goals for the future. Learn how he and his team are working to make education smarter while prioritizing data security.
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Discover how Alex Wood, CISO at Uplight, tackles evolving cybersecurity threats with AI-driven solutions.
Discover key insights from Osterman Research’s latest report on modernizing MFA to tackle rising identity threats.
Learn from Abnormal customers about the challenges of AI-enhanced attacks and discover why they trust AI-driven security solutions to stay ahead of these evolving threats.
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Discover how industry experts view and are preparing for AI’s evolving role in cybersecurity.
Explore expert insights from Bernard Wright, CISO at ClearBank, on the evolving cybersecurity challenges and strategies to protect the financial sector.
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Discover how CIO Roger Morris protects popular restaurant brands, including Taco Bell, Whataburger, 7 Brew, and more, from cyber threats.
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Discover why Abnormal customers trust an AI-powered solution to protect their organizations from advanced email attacks.
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
A secure email gateway (SEG) simply cannot defend your cloud email platform. Stop advanced threats with Abnormal Security. Here's what our customers have to say about ditching their SEGs.
See how Abuse Mailbox Automation provides organizations with an extra layer of security, helping security teams automate the user-reported phishing email workflow and identify malicious emails.
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
Discover the biggest takeaways about business email compromise and social engineering from the 2023 Verizon Data Breach Investigations Report (DBIR).
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to phishing attacks.
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
As spammers become more sophisticated across cloud services, Abnormal is addressing new attacks including this recent malicious calendar invite.