Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B 11 14 22 SPM Launch Blog Graphics
Security Posture Management gives organizations insight into cloud configuration risks and gaps across user and app privileges.
Read More
B 11 14 22 SPM Launch Blog 2
Cloud email platforms enable better collaboration, but they also create new entry points, making sensitive data more accessible to attackers.
Read More
B 10 05 22 Cloud Email Security Platform Essentials
Learn the 7 key capabilities a cloud email security platform should have in order to address and resolve common email security challenges.
Read More
B 11 07 22 Vision 23 Blog
Discover the latest trends in cybersecurity as we look toward the email threats of the future in partnership with SecureWorld.
Read More
B 11 14 22 SPM Launch Blog Graphics

Introducing Three New Knowledge Bases and the Security Posture Management Add-On

B 11 14 22 SPM Launch Blog 2

Redefining Cloud Email Security to Protect Against Emerging Email Platform Attacks

B 10 05 22 Cloud Email Security Platform Essentials

7 Cloud Email Security Platform Essentials

B 11 07 22 Vision 23 Blog

Introducing the Vision 2023 Virtual Conference

SEG
Secure Email Gateways (SEGs) have proven effective in the past, but they are ineffective against modern social engineering tactics and targeted email threats.
Read More
B 1500x1500 Knowledge Base People Base L1 R1
Discover how Abnormal uses contextual, behavioral data to uncover anomalous activity across logins and devices with PeopleBase.
Read More
ABN B 12 2 22 Expanding our partnership L1 R2
Our partnership with Microsoft has created plenty of opportunities to celebrate. Here are some of the especially exciting moments from 2022.
Read More
B 1500x1500 5 key takeaways L1 R1
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
Read More
B Threat Intel Phishing Attacks HR Policies
Threat actors are capitalizing on the new year, posing as human resources officials to send credential phishing attacks.
Read More
ESG Blog
ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
Read More
CFO Cover
Industry-leading CFO Sam Wolff discusses spending on security technology in the current macroeconomic conditions.
Read More
B 1500x1500 Knowledgebase Appbase blog L1 R1
Discover how Abnormal provides greater visibility into application permissions and data access across the cloud email platform with AppBase.
Read More
B ML Blog
Discover how the Abnormal attack detection team utilizes feature systems, advanced language models, and per-customer understanding in our approach to machine learning in cybersecurity.
Read More
TEI BC
Forrester highlights ROI wins that the average organization can expect to see in 2023 as a result of deploying Abnormal.
Read More
TAG Cyber Cyber Risks Cloud Email BC
Cybersecurity expert Ed Amoroso explores the greatest cyber risks associated with cloud email, including BEC, credential phishing, and spoofing.
Read More
B 12 19 22 Vision Key Takeaway Blog Graphics Vision23 L2 R1
From Frank Abagnale to Rachel Tobac, our virtual conference was full of key insights about social engineering and more. Check them out here.
Read More
Spam Blog Cover
As spammers become more sophisticated across cloud services, Abnormal is addressing new attacks including this recent malicious calendar invite.
Read More
B 1500x1500 Top Blogs of 2022 Blog Post
We’re already hard at work creating more helpful content for 2023, but first we wanted to highlight a few of our popular blog posts from the past year.
Read More
B 1500x1500 Knowledge Base Vendor Base L1 R1
Discover how Abnormal provides detailed risk assessments based on vendor email analysis with VendorBase.
Read More
B 1500x1500 Cybersecurity Predictions L1 R1
Learn how validating your tools, ensuring ROI, and extracting the optimal benefits from your investment can help protect you from cyberattacks in 2023.
Read More
B 1500x1500 TAG Cyber Blog Graphics L1 R1
Learn why the modern and evolving workplace requires focused and ongoing security attention to cloud email threats.
Read More
B 1500x1500 Multi Tenant Management L1 R1
Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
Read More
B 12 12 22 Chat GPT
Discover how ChatGPT can be used by threat actors to run business email compromise schemes and other email attacks.
Read More
B 1500x1500 Cybersecurity Stats L2 R1
Discover some of the most significant cybersecurity statistics from 2022 and how your organization can minimize risk heading into the new year.
Read More
B 1500x1500 Holiday Threats Email L2 R1
Reduce your risk of a BEC or phishing attack this holiday season by watching out for these email threats.
Read More
B 1500x1500 Emerging Threats Webinar Recap L1 R1
Cybersecurity expert Ira Winkler discusses risks to cloud email and how to block both inbound email attacks and emerging threats.
Read More
B 1500x1500 Types of Email Platform Attacks L1 R2
Discover the most common types of email platform attacks in your cloud network and how you can prevent them.
Read More
B 1500x1500 Lilac Wolverine L1 R1
Threat group Lilac Wolverine is fine-tuning the art of exploiting people’s willingness to help others in some of the largest gift card attacks we've seen.
Read More
 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22