chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Abnormal 2022 Review v3
The last year was truly memorable for Abnormal Security. Here are a few of the biggest highlights of 2022 including product launches and platform updates.
Read More
B Firebrick Ostrich Blog
Discover how Firebrick Ostrich uses open-source intelligence to run their BEC scams in these supply chain compromise examples.
Read More
B 1 30 23 Product Recap
This winter, Abnormal added three new Knowledge Bases, multi-tenant management, and more to protect cloud users against email platform attacks.
Read More
B Artificial Intelligence Address Email Threats
In part 3 of our 5-part series, Ed Amoroso discusses how artificial intelligence (AI) technology is particularly useful for reducing cyber risks to cloud email.
Read More
CFO2 B
CFO Adam Meister of Clari discusses cybersecurity spending and risk tolerance amid unpredictable economic shifts.
Read More
SEG
Secure email gateways (SEGs) have proven effective in the past, but they are ineffective against modern social engineering tactics and targeted email threats.
Read More
B 1500x1500 Knowledge Base People Base L1 R1
Discover how Abnormal uses contextual, behavioral data to uncover anomalous activity across logins and devices with PeopleBase.
Read More
ABN B 12 2 22 Expanding our partnership L1 R2
Our partnership with Microsoft has created plenty of opportunities to celebrate. Here are some of the especially exciting moments from 2022.
Read More
B 1500x1500 5 key takeaways L1 R1
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
Read More
B Threat Intel Phishing Attacks HR Policies
Threat actors are capitalizing on the new year, posing as human resources officials to send credential phishing attacks.
Read More
ESG Blog
ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
Read More
CFO Cover
Industry-leading CFO Sam Wolff discusses spending on security technology in the current macroeconomic conditions.
Read More
B 1500x1500 Knowledgebase Appbase blog L1 R1
Discover how Abnormal provides greater visibility into application permissions and data access across the cloud email platform with AppBase.
Read More
B ML Blog
Discover how the Abnormal attack detection team utilizes feature systems, advanced language models, and per-customer understanding in our approach to machine learning in cybersecurity.
Read More
TEI BC
Forrester highlights ROI wins that the average organization can expect to see in 2023 as a result of deploying Abnormal.
Read More
TAG Cyber Cyber Risks Cloud Email BC
Cybersecurity expert Ed Amoroso explores the greatest cyber risks associated with cloud email, including BEC, credential phishing, and spoofing.
Read More
B 12 19 22 Vision Key Takeaway Blog Graphics Vision23 L2 R1
From Frank Abagnale to Rachel Tobac, our virtual conference was full of key insights about social engineering and more. Check them out here.
Read More
Spam Blog Cover
As spammers become more sophisticated across cloud services, Abnormal is addressing new attacks including this recent malicious calendar invite.
Read More
B 1500x1500 Top Blogs of 2022 Blog Post
We’re already hard at work creating more helpful content for 2023, but first we wanted to highlight a few of our popular blog posts from the past year.
Read More
B 1500x1500 Knowledge Base Vendor Base L1 R1
Discover how Abnormal provides detailed risk assessments based on vendor email analysis with VendorBase.
Read More
B 1500x1500 Cybersecurity Predictions L1 R1
Learn how validating your tools, ensuring ROI, and extracting the optimal benefits from your investment can help protect you from cyberattacks in 2023.
Read More
B 1500x1500 TAG Cyber Blog Graphics L1 R1
Learn why the modern and evolving workplace requires focused and ongoing security attention to cloud email threats.
Read More
B 1500x1500 Multi Tenant Management L1 R1
Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
Read More
B 12 12 22 Chat GPT
Discover how ChatGPT can be used by threat actors to run business email compromise schemes and other email attacks.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo