It’s one thing to add machine learning and artificial intelligence features to an existing software platform. It’s quite another to build an entire company like Abnormal Security around machine learning technology, and
Join us next week for the webinar, The Rising Threat of Vendor Email Compromise in a Post-SolarWinds Era. Why should you attend? Vendor email compromise is on the rise. These advanced attacks have
Check out software engineer Sharon Lin’s medium blog on joining the Abnormal team. Read her full story below. This January, I joined Abnormal Security as a new grad Software Engineer. As you
For Office 365 customers, Abnormal now manually or automatically remediates account takeover attacks. When an attack is detected, we sign users out of active sessions and disable compromised accounts. Manual remediation is
The prolific attack on SolarWinds and their partner ecosystem will forever change how we view supply chain security and the role email communication plays in it. As the events and details surrounding
New Role-Based Access Control Functionality – Abnormal Security is introducing new functionality to our Role Based Access Controls. With this update we are introducing two new roles: Global Per-Product Access – this
Abnormal Security detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 Out of Office replies as well as read receipts back to them. These
Abnormal is the email security company that stands for trust.
© 2021 Abnormal Security Corporation.
All rights reserved.