Abnormal Blog
Learn how Microsoft 365 and Abnormal work together to provide comprehensive defense-in-depth protection in part two of our webinar recap.
High-impact emails are on the rise and secure email gateways (SEGs) don’t have the functionality to mitigate them. Learn how your SEG is letting you down.
The email threat landscape is evolving fast. Discover the new tactics cybercriminals are using and how to reduce your risk of falling victim to these modern email attacks.
There’s no room for 2002 solutions when it comes to your organization’s email security. In 2022, you need a modern approach and modern architecture to stop modern attacks.
If you’re interested in hearing from the true expert in security, plan to join us for a live-only webinar on Thursday, March 17th at 1:00pm ET.
January 28th is Data Privacy Day, where individuals and organizations alike can take part in the international effort to safeguard privacy and data.
We've arrived at that time of year—a time for reflection and celebration and spending time with family, and also that time of year where the cyber grinches hope to spoil the holiday fun.
Before we jump into modern threats, I think it’s important to set the stage since email has been around. Since email existed, threat actors targeted email users with malicious messages, general spam, and different ways to take advantage of the platform. Then of course, more dangerous attacks started to come up… things like malware and other viruses.
While cybersecurity awareness is a year-round venture, it is especially important to be mindful during certain times of the year. With Thanksgiving here in the United States on Thursday, our thoughts will likely be on our family and friends and everything we have to be thankful for this holiday season.
Since well-known hacker Kevin Mitnick helped popularize the term 'social engineering' in the 1990s, both physical and cybersecurity professionals have become increasingly aware of the risks associated with the human element. The idea itself, and many of the techniques associated with social engineering, have been around as long as there have been scam artists.
As we close the books on another Cybersecurity Awareness Month, it’s clear that cybersecurity should be a priority all twelve months—not just one. To do so, security teams should emphasize practical tools (the what) and techniques (the how) to keep the company and employees safe.
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
If you’re a podcast fan and haven’t subscribed to Masters of Scale yet, I’d highly recommend it. Reid Hoffman, one of the most successful entrepreneurs and investors of our time—cofounder of LinkedIn and investor in companies like Facebook, Airbnb, and Zynga—is the host, and he shares...