Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
Discover how new email-like protections detect threats and mitigate risk across connected collaborative applications.
Discover how new Abnormal capabilities allow your organization to experience improved security and better collaboration.
Happy World Password Day! Learn why good password hygiene is important for every employee and how to reduce the risk of account takeovers.
Discover how real-world attackers abuse compromised personal email accounts to elicit response and realize financial and informational gain.
Losses from business email compromise (BEC) attacks are consistently increasing. Here are 11 examples of the most costly BEC attacks from the past decade.
Hear what the CISOs at Abnormal Security, Wiz, Rubrik, and Noname Security have to say about the biggest security challenges modern organizations face.
Learn the risks behind third-party app integrations and permissions, and how posture management can help.
Discover more about collaboration app attacks and how to protect your organization from this emerging threat.
Our Head of Security Operations shares why being an Abnormal customer inspired him to become an Abnormal employee and explores the key differentiators of our cloud email security platform.
Phishing attacks are a much larger issue than many organizations realize. Here are 5 reasons why you need to make preventing phishing a priority.
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Celebrate Identity Management Day by learning more about the latest practices, tools, and techniques to keep your data secure.
Discover how real-world attackers use open redirects to access sensitive data, bypassing traditional secure email gateways.
Learn how to make the best case for cybersecurity spending in your organization with key tips for communicating CISO to CFO.
Google customers now have access to two new Abnormal Knowledge Bases: PeopleBase and TenantBase to increase security visibility across the cloud email platform.
We wanted to make sure that you have the opportunity to check out the most recent news and updates. Here are a few posts from the last quarter that you might have missed.
The new bi-directional integration between Abnormal and CrowdStrike’s solutions helps security teams correlate meaningful events across identity, endpoint, and email solutions, and respond quickly to incidents in progress.
Discover the challenges of securing cloud email, the evolution of cloud email security, and key considerations when evaluating cloud email security solutions.
Bill Losch of Okta discusses the macroeconomic environment and how CISOs can prepare for budget discussions with their CFOs.
Knowing what to do after receiving a business email compromise attack is essential for preventing costly consequences. Learn how to respond to BEC attacks.
Vendor email compromise is expensive. See how Abnormal protected our customer from a $36 million invoice fraud attack.
Learn why executives are popular targets for account takeovers, the consequences of a successful takeover, and how organizations can prevent these attacks.
In the final post of our series with Ed Amoroso, the TAG Cyber CEO discusses some of the defensive and offensive trends for cloud email.
See the Abnormal Solution to the Email Security Problem
Protect your organization from the full spectrum of email attacks with Abnormal.
