chat
expand_more

1669157072577

Jade Hill

Director of Content Marketing

Jade Hill is the Director of Content and Communications at Abnormal Security, where she leads the content marketing and media relations teams. With over 10 years of professional experience in brand, content, and digital marketing, Jade has a deep understanding of how to reach her audience through relevant, high-quality content. Her previous experience includes leading marketing functions in the email security space at Agari, acquired by HelpSystems/Fortra, as well as at Facebook and BlueJeans Network. Jade holds an MA from the University of Chicago and a BA from Franklin College.

B Malicious AI
Discover how AI is being used for bad as hackers leverage it to carry out their cybercrimes, in this recap of a white paper from hacker FC.
Read More
B Convergence S3 Announcement Blog
Join us for Season 3 of The Convergence of AI + Cybersecurity as we explore deepfakes, the evolving role of the SOC, and the intricacies of AI-native security.
Read More
B Earn Your CPE Credits with Abnormal
Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
Read More
B Cybersecurity Influencers Blog 2024
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 15 innovative and influential thought leaders on social media.
Read More
B Convergence S2 Recap Blog
Season 2 of our web series has come to a close. Explore a few of the biggest takeaways and learn how to watch all three chapters on demand.
Read More
B 1500x1500 MKT494 Top Women in Cybersecurity
In honor of Women's History Month, we're spotlighting 10 women leaders who are making invaluable contributions to cybersecurity.
Read More
B 1500x1500 MKT481 Images for Convergence Season 2 Announcement Blog
Generative AI attacks and AI-powered security tools are changing the security landscape. Get the insights you need to know in our upcoming web series.
Read More
B Mr Wonderful Talks AI
Explore the future of AI and cybersecurity and learn why prioritizing security investments is crucial with Kevin O’Leary of Shark Tank fame.
Read More
B 1500x1500 MKT395z 21 Images for Vision 2024 Recap Blog
Discover what you missed at Vision 2024 with insights from our investors, partners, and email security experts and learn how to watch the entire conference on demand.
Read More
B Reasons to Attend Vision 2024 Blog
Register for Abnormal's cybersecurity conference to hear from Kevin O’Leary, Keren Elazari, and the Secret Service, and get a head start on your ISC2 CPE credits.
Read More
MKT395z 4 B Announcing Vision 2024 Blog
Join industry leaders and innovators for insights, cutting-edge technologies, and a keynote by Kevin O'Leary at this cybersecurity conference.
Read More
B 2023 Cybersecurity Stats
Learn the biggest cybersecurity statistics of 2023—from the rise of gen AI to the staggering losses caused by BEC. Stay informed and protect your organization.
Read More
B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B Security Leaders Reacting to AI
To understand how organizations are responding to the evolving threat of AI, we surveyed 300 cybersecurity leaders. Here are a few key takeaways.
Read More
B Two Decades of Email Attacks
See how cyber threats have evolved over the past two decades as we celebrate 20 years of Cybersecurity Awareness Month.
Read More
B 8 15 23 Glossary
Explore this glossary of need-to-know artificial intelligence terms to better understand AI and its uses.
Read More
B 7 31 23 threatblog
Third-party apps present increased cyberattack risks to email environments via app permissions. Traditional email can't handle the challenge, but Abnormal can.
Read More
B 7 14 23 Gen A Ipng
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Read More
Fbi 50 billion bec cover
The FBI IC3 identified $51 billion in exposed losses due to business email compromise from 2013 to 2022—an increase from previous estimations.
Read More
B 6 27 23 Chat Attacks
ChatGPT and other generative AI tools can be used to craft highly convincing phishing emails and social engineering scams. Here's how to spot them and fight back.
Read More
ESG
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
Read More
B Eric Cole Webinar Recap Blog
World-renowned cybersecurity expert Dr. Eric Cole explores some of the common mistakes companies make when building security programs.
Read More
B Abnormal Microsoft 365 v2
Learn why Abnormal customers love our comprehensive email security for Microsoft Office 365.
Read More
B 12 19 22 Vision Key Takeaway Blog Graphics Vision23 L2 R1
From Frank Abagnale to Rachel Tobac, our virtual conference was full of key insights about social engineering and more. Check them out here.
Read More
B 1500x1500 Emerging Threats Webinar Recap L1 R1
Cybersecurity expert Ira Winkler discusses risks to cloud email and how to block both inbound email attacks and emerging threats.
Read More
B 11 07 22 Vision 23 Blog
Discover the latest trends in cybersecurity as we look toward the email threats of the future in partnership with SecureWorld.
Read More
B 08 08 22 AI Announcement Blog
Introducing Abnormal Intelligence—your go-to resource for expert insights into emerging cyber threats and email attack trends.
Read More
B 07 19 22 2022 Email Security Trends 1
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Read More
B 05 31 22 RSA Conference
Attending RSA Conference 2022? So is Abnormal! We’d love to see you at the event.
Read More
B 04 08 22 Supply Chain
The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.
Read More
B 04 06 22 BEC threat report
Business email compromise (BEC) attacks have increased considerably over the past 6 months. Here’s how cybercriminals are changing their targets and tactics.
Read More
Blog phone fraud cover
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
Read More
Blog what do phishing emails cover
Phishing attacks are on the rise; the FBI reports that such attacks cost $52 million in 2022, and phishing has been the most common cybercrime reported to the IC3 since 2019. If you're one of the many people targeted by a phishing email, you're not alone.
Read More
Blog phishing cover
The phishing email is one of the oldest and most successful types of cyberattacks. Attackers have long used phishing as a common attack vector to steal sensitive information or credentials from their victims. While most phishing emails are relatively simple to spot, the number of successful attacks has grown in recent years.
Read More
Blog microsoft abnormal cover
Before we jump into modern threats, I think it’s important to set the stage ​​since email has been around. Since email existed, threat actors targeted email users with malicious messages, general spam, and different ways to take advantage of the platform. Then of course, more dangerous attacks started to come up… things like malware and other viruses.
Read More
Blog rising building
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Read More
Blog dark keyboard
Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion in reported losses in 2020 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact...
Read More