chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Third Party
Learn the risks behind third-party app integrations and permissions, and how posture management can help.
Read More
B Protecting Against Collaboration Apps
Discover more about collaboration app attacks and how to protect your organization from this emerging threat.
Read More
B Abnormal on Abnormal How We Use Our Platform
Our Head of Security Operations shares why being an Abnormal customer inspired him to become an Abnormal employee and explores the key differentiators of our cloud email security platform.
Read More
B Phishing is Your Biggest Cybersecurity Problem
Phishing attacks are a much larger issue than many organizations realize. Here are 5 reasons why you need to make preventing phishing a priority.
Read More
B Chat GPT
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Read More
B IMD
Celebrate Identity Management Day by learning more about the latest practices, tools, and techniques to keep your data secure.
Read More
B Open Red
Discover how real-world attackers use open redirects to access sensitive data, bypassing traditional secure email gateways.
Read More
B Cfo Roi
Learn how to make the best case for cybersecurity spending in your organization with key tips for communicating CISO to CFO.
Read More
B Google KB
Google customers now have access to two new Abnormal Knowledge Bases: PeopleBase and TenantBase to increase security visibility across the cloud email platform.
Read More
B Q1 2023 in Review
We wanted to make sure that you have the opportunity to check out the most recent news and updates. Here are a few posts from the last quarter that you might have missed.
Read More
B 03 28 23 CRWD blog post
The new bi-directional integration between Abnormal and CrowdStrike’s solutions helps security teams correlate meaningful events across identity, endpoint, and email solutions, and respond quickly to incidents in progress.
Read More
B Evaluating Cloud Email Security Solutions
Discover the challenges of securing cloud email, the evolution of cloud email security, and key considerations when evaluating cloud email security solutions.
Read More
B 3 21 23 CFO
Bill Losch of Okta discusses the macroeconomic environment and how CISOs can prepare for budget discussions with their CFOs.
Read More
B Business Email Compromise Response
Knowing what to do after receiving a business email compromise attack is essential for preventing costly consequences. Learn how to respond to BEC attacks.
Read More
B 36 M
Vendor email compromise is expensive. See how Abnormal protected our customer from a $36 million invoice fraud attack.
Read More
B Keeping VIP Emails Safe
Learn why executives are popular targets for account takeovers, the consequences of a successful takeover, and how organizations can prevent these attacks.
Read More
B TAG Cyber Future of Cloud Email Security
In the final post of our series with Ed Amoroso, the TAG Cyber CEO discusses some of the defensive and offensive trends for cloud email.
Read More
B SVB Closure Cybersecurity Threats
The Silicon Valley Bank (SVB) closure has created opportunities for threat actors to launch more convincing email attacks. Here's how to lower your risk.
Read More
B 3 14 23 Fraud
Discover how Abnormal detects and remediates payment fraud and invoice email attacks that bypass secure email gateways (SEGs).
Read More
B 2022 FBI IC3 Report Blog
Discover the biggest takeaways about business email compromise, pig butchering, and phishing from the 2022 FBI Internet Crime Report.
Read More
B TAG Cyber Abnormal Address Cloud Email Attacks
Cybersecurity expert Ed Amoroso explains how the Abnormal Security platform detects and blocks the full range of cyber threats to cloud email.
Read More
B 3 9 23 SPM
Discover how Email Security Posture Management provides holistic cloud email security that protects both the inbox and those entry points beyond it.
Read More
B 2 27 23 Partner Awards
See the winners of the Abnormal Partner of the Year program who have made a tremendous impact on our customers and business growth.
Read More
B Eric Cole Webinar Recap Blog
World-renowned cybersecurity expert Dr. Eric Cole explores some of the common mistakes companies make when building security programs.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo