chat
expand_more

Author mike britton

Mike Britton

Chief Information Officer

Mike Britton is the CIO of Abnormal Security, where he leads the information security team, privacy program, and corporate AI strategy. He is integral in building and maintaining the customer trust program, performing vendor risk analysis, protecting the workforce with proactive monitoring of the multi-cloud infrastructure, and leading the implementation of AI-powered tools and processes to enhance employee efficiency and productivity. He also works closely with the Abnormal product and engineering teams to ensure platform security and serves as the voice of the customer for feature development.

Mike previously spent three years as the CISO of Abnormal Security. Prior to Abnormal, Mike spent six years as the CSO and Chief Privacy Officer for Alliance Data and previously worked for IBM and VF Corporation. He brings 25 years of information security, privacy, compliance, and IT experience from multiple Fortune 500 global companies. Mike holds an MBA from the University of Dallas and a BA in Political Science from the University of Mary Washington.

B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Manufacturing Industry Attack Trends Blog
New data shows a surge in advanced email attacks on manufacturing organizations. Explore our research on this alarming trend.
Read More
B Reg AI
There are ways to protect the public from the potential dangers of AI without stifling innovation—and the Europeans have already shown us how.
Read More
B Healthcare Industry Attack Trends Blog
Targeted attacks on the healthcare industry are on the rise. Explore the latest threat trends and learn how to protect your organization.
Read More
B Cybersecurity Awareness Month Engage Educate Empower
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats all year with these 5 tips.
Read More
B Transportation Industry Attack Trends Blog
Explore the latest attack trends in the transportation industry and learn how to defend against rising threats like phishing, BEC, and VEC.
Read More
B How BEC Attacks Are Evolving in AI Era
Discover how to protect your business from sophisticated BEC attacks, including vendor email compromise, AI-generated scams, and email thread hijacking.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More
B State and Local Government Attack Trends
Advanced attacks targeting state and local governments are increasing. Discover what our research revealed about this alarming trend.
Read More
B UPS Fed Ex Phishing Impersonation
Attackers attempt to steal payment information by posing as UPS and FedEx and sending fake shipment notifications about a pending delivery.
Read More
B Cross Platform Account Takeover
Discover the dangers of cross-platform account takeover, the challenges of detecting this attack, and how to implement proactive protection against ATO.
Read More
B MKT498 Images for FBI IC3 2023 Report Blog
Explore the biggest takeaways from the 2023 FBI IC3 Report, including the steady increase in losses due to business email compromise (BEC).
Read More
B 1500x1500 CISO Chat GPT Recap Blog 03 04 24
In this Vision 2024 CISO panel recap, Mike Britton shares some of the biggest takeaways from his conversation with industry-leading CISOs.
Read More
B 1500x1500 MKT477 Energy Infrastructure Data Blog
Energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. Learn more.
Read More
B 1500x1500 MKT468a Open Graph Images for Phishing Subjects Blog
Discover the most engaging phishing email subjects, according to Abnormal data, and how to protect your organization from these scams.
Read More
B 1 17 24 Best Practices 1
Discover key cybersecurity strategies for protecting your organization against emerging email threats in 2024.
Read More
B 12 18 23 Gen AI
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
Read More
B 1500x1500 MKT440a Bazarcall Attack Blog Graphics
Explore the intricacies of this BazarCall phishing attack that uses a Google Form for heightened authenticity.
Read More
B Disney Attack Blog
This Disney+ scam email uses brand impersonation and personalization to send a convincing fake subscription charge notice.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More
B Bittrex Phishing Attack
Attackers capitalize on the Bittrex bankruptcy by targeting customers with a convincing credential phishing attack.
Read More
B CISO Career Tips
Interested in charting a course toward becoming a CISO? Here are 12 tips to help you on your journey.
Read More
B Health Care
Email attacks like BEC against the healthcare industry are on the rise in 2023. Protect yourself with sophisticated cloud-native email security.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B 8 23 23 Mic Phishing
It’s 2023 but not much has changed in phishing, as brand impersonation remains an attacker favorite.
Read More
VEC attacks blog cover
Discover how one threat actor compromised five vendor organizations to commit the same invoice fraud attack against more than a dozen victims.
Read More
B 7 19 23 Fed Email Breach
Discover key cybersecurity takeaways from last week’s email breach on federal agencies by a Chinese APT group.
Read More
B 6 8 23 Collab
Business collaboration tools help employees with productivity and communication. But they can also present a number of cybersecurity risks for your business.
Read More
B 6 2 23 cybercriminals
Businesses need to stay ahead of malicious apps, social engineering, and more to keep their emails safe.
Read More
BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More
B World Password Day
Happy World Password Day! Learn why good password hygiene is important for every employee and how to reduce the risk of account takeovers.
Read More
B CISO Fireside Chat Recap
Hear what the CISOs at Abnormal Security, Wiz, Rubrik, and Noname Security have to say about the biggest security challenges modern organizations face.
Read More
B Protecting Against Collaboration Apps
Discover more about collaboration app attacks and how to protect your organization from this emerging threat.
Read More
B IMD
Celebrate Identity Management Day by learning more about the latest practices, tools, and techniques to keep your data secure.
Read More
B 36 M
Vendor email compromise is expensive. See how Abnormal protected our customer from a $36 million invoice fraud attack.
Read More
B Keeping VIP Emails Safe
Learn why executives are popular targets for account takeovers, the consequences of a successful takeover, and how organizations can prevent these attacks.
Read More
B 2022 FBI IC3 Report Blog
Discover the biggest takeaways about business email compromise, pig butchering, and phishing from the 2022 FBI Internet Crime Report.
Read More
B 1500x1500 Cybersecurity Predictions L1 R1
Learn how validating your tools, ensuring ROI, and extracting the optimal benefits from your investment can help protect you from cyberattacks in 2023.
Read More
B 1500x1500 Modern Email Attacks Webinar Series L4 R2
Our Modern Email Attacks series has wrapped! Here are some of the biggest takeaways from Chris Krebs, Troy Hunt, and Theresa Payton.
Read More
B 1500x1500 Distributed Workforce L3 R4
Allowing remote work improves engagement and retention, but it also increases your attack surface. Here’s how to protect your distributed workforce.
Read More
B Account Takeover Blog 08 22 22
Learn how threat actors execute email account takeovers, how they exploit compromised accounts, and what you can do to reduce your risk.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
Blog mitigate threats cover
Learn about the most common socially-engineered attacks and why these tactics are still so successful—despite a growing awareness from employees.
Read More
B 04 19 22 What CIS Oneedto Know
The email threat landscape is evolving fast. Discover the new tactics cybercriminals are using and how to reduce your risk of falling victim to these modern email attacks.
Read More
Cover Threat of Phishing Blog 04 12 22
Successful phishing attacks have increased by 34% in the last year, making it the most common email attack. Learn why phishing is so dangerous.
Read More
Blog cover data privacy day
January 28th is Data Privacy Day, where individuals and organizations alike can take part in the international effort to safeguard privacy and data.
Read More
Blog holiday scams cover
We've arrived at that time of year—a time for reflection and celebration and spending time with family, and also that time of year where the cyber grinches hope to spoil the holiday fun.
Read More
Blog black friday scam cover
While cybersecurity awareness is a year-round venture, it is especially important to be mindful during certain times of the year. With Thanksgiving here in the United States on Thursday, our thoughts will likely be on our family and friends and everything we have to be thankful for this holiday season.
Read More
Blog csam tools cover
As we close the books on another Cybersecurity Awareness Month, it’s clear that cybersecurity should be a priority all twelve months—not just one. To do so, security teams should emphasize practical tools (the what) and techniques (the how) to keep the company and employees safe.
Read More