Author mike britton

Mike Britton

Chief Information Security Officer

Mike Britton is the CISO of Abnormal Security, where he leads information security and privacy programs. Prior to Abnormal Security, Mike spent the last six years as the CSO and Chief Privacy Officer for Alliance Data. He brings 25 years of information security, privacy, compliance, and IT experience from a variety of Fortune 500 global companies. He holds an MBA with a concentration in Information Assurance from the University of Dallas.

BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More
B World Password Day
Happy World Password Day! Learn why good password hygiene is important for every employee and how to reduce the risk of account takeovers.
Read More
B CISO Fireside Chat Recap
Hear what the CISOs at Abnormal Security, Wiz, Rubrik, and Noname Security have to say about the biggest security challenges modern organizations face.
Read More
B Protecting Against Collaboration Apps
Discover more about collaboration app attacks and how to protect your organization from this emerging threat.
Read More
B IMD
Celebrate Identity Management Day by learning more about the latest practices, tools, and techniques to keep your data secure.
Read More
B 36 M
Vendor email compromise is expensive. See how Abnormal protected our customer from a $36 million invoice fraud attack.
Read More
B Keeping VIP Emails Safe
Learn why executives are popular targets for account takeovers, the consequences of a successful takeover, and how organizations can prevent these attacks.
Read More
B 2022 FBI IC3 Report Blog
Discover the biggest takeaways about business email compromise, pig butchering, and phishing from the 2022 FBI Internet Crime Report.
Read More
B 1500x1500 Cybersecurity Predictions L1 R1
Learn how validating your tools, ensuring ROI, and extracting the optimal benefits from your investment can help protect you from cyberattacks in 2023.
Read More
B 1500x1500 Modern Email Attacks Webinar Series L4 R2
Our Modern Email Attacks series has wrapped! Here are some of the biggest takeaways from Chris Krebs, Troy Hunt, and Theresa Payton.
Read More
B 1500x1500 Distributed Workforce L3 R4
Allowing remote work improves engagement and retention, but it also increases your attack surface. Here’s how to protect your distributed workforce.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Account Takeover Blog 08 22 22
Learn how threat actors execute account takeovers, how they exploit compromised accounts, and what you can do to reduce your risk.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
Blog mitigate threats cover
Learn about the most common socially-engineered attacks and why these tactics are still so successful—despite a growing awareness from employees.
Read More
B 04 19 22 What CIS Oneedto Know
The email threat landscape is evolving fast. Discover the new tactics cybercriminals are using and how to reduce your risk of falling victim to these modern email attacks.
Read More
Cover Threat of Phishing Blog 04 12 22
Successful phishing attacks have increased by 34% in the last year, making it the most common email attack. Learn why phishing is so dangerous.
Read More
Blog krebs cover
If you’re interested in hearing from the true expert in security, plan to join us for a live-only webinar on Thursday, March 17th at 1:00pm ET.
Read More
Blog cover data privacy day
January 28th is Data Privacy Day, where individuals and organizations alike can take part in the international effort to safeguard privacy and data.
Read More
Blog holiday scams cover
We've arrived at that time of year—a time for reflection and celebration and spending time with family, and also that time of year where the cyber grinches hope to spoil the holiday fun.
Read More
Blog black friday scam cover
While cybersecurity awareness is a year-round venture, it is especially important to be mindful during certain times of the year. With Thanksgiving here in the United States on Thursday, our thoughts will likely be on our family and friends and everything we have to be thankful for this holiday season.
Read More
Blog csam tools cover
As we close the books on another Cybersecurity Awareness Month, it’s clear that cybersecurity should be a priority all twelve months—not just one. To do so, security teams should emphasize practical tools (the what) and techniques (the how) to keep the company and employees safe.
Read More
Blog hiring cybersecurity leaders
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
Read More