B 1 23 23 Demo D Ay
Tas Jalali, Head of Cybersecurity at AC Transit speaks with Abnormal about his security strategy for the new year.
Read More
B 01 12 23 ADT video 1
With Abnormal, ADT has a robust security solution that protects its employees from advanced email attacks.
Read More
B 1500x1500 Hospitality L1 R1
Threat actors target hospitality businesses to steal troves of personally identifiable information. Learn how Abnormal stops these attacks.
Read More
B 1500x1500 Transportation Industry L1 R1
Cybercriminals target the transportation industry to worsen supply chain strains or put the public at risk. Learn how Abnormal prevents these attacks.
Read More
B 1500x1500 Energy Industry L2 R1
Threat actors routinely target energy and infrastructure providers to disrupt critical operational technologies. Learn how Abnormal blocks these attacks.
Read More
B 1500x1500 Intelligent security summit webinar
Discover how security leaders are mitigating new internal threats and the best ways to protect your organization from these new attack opportunities.
Read More
B 1 19 23 Arch Capital OPT2
See why the Arch Insurance team considers Abnormal’s platform to be a highly effective, easy-to-use risk reduction solution.
Read More
B 1500x1500 Green Hill Case Study 12 09 22
With Abnormal protecting inboxes & enhancing incident response, investment banking firm Greenhill can focus on guiding clients through complex events.
Read More
B 11 30 22 EAB vid
With thousands of threats stopped, Abnormal has freed up EAB’s security team to focus on improving access to education rather than investigating and remediating email threats.
Read More
B 12 09 22 Hacking with Hackers Graphics Vision23 L1 R1
Hackers Rachel Tobac and James Linton share how to better protect against socially-engineered attacks. Watch the on-demand webinar from Vision 2023.
Read More
B 12 08 22 Protecting Microsoft 365 Graphics Vision23 L1 R1
In this recorded presentation from Vision 2023, leaders from Microsoft and Abnormal share how to protect employees from increasingly sophisticated attacks.
Read More
B 12 09 22 SO Ccessful Team Graphics Vision23 L1 R1
In this on-demand webinar from Vision 2023, security leaders from Acrisure and Abnormal Security discuss how SOC teams can prioritize more effectively.
Read More
B 12 09 22 Art of the Impossible Graphics Vision23 L1 R1
Abnormal's Crane Hassold and Stephen Doughtery of the Secret Service discuss how enterprises can stop BEC. Watch the recorded session from Vision 2023.
Read More
B 12 12 22 On Demand Landing Page Vision23 L1 R2
Discover more about the next generation of threats from some of the leading voices in cybersecurity. Get on-demand access to recordings from Vision 2023.
Read More
B 11 08 22 Preparing for Threats Vision23
CISOs from Abnormal Security, Acrisure, & Archaea Energy explore how enterprises can protect against emerging threats. Watch the webinar from Vision 2023.
Read More
B 12 08 22 Cybercrime Identity Theft Graphics Vision23 L1 R1
In this recorded session from Vision 2023, author, consultant, and convicted felon Frank Abagnale shares how organizations can reduce cybersecurity risks.
Read More
B 1500x1500 biggest risks with cloud email L1 R1
Hear from 3 cybersecurity experts on how to minimize your exposure and reduce your vulnerability to email-borne attacks in a cloud-based environment.
Read More
B 1500x1500 Next Generation L1 R1
In this on-demand webinar, cybersecurity expert Ira Winkler explores risks to cloud email and shares what enterprises can do to block these attacks.
Read More
B 10 19 22 AC Transit Vid 1
Together, Abnormal and Microsoft provide AC Transit with a robust, efficient security solution that blocks advanced threats from reaching inboxes.
Read More
B 10 05 22 Sentara
With Abnormal, not-for-profit healthcare organization Sentara enjoys reduced inbox threats, better employee email experiences, and more time to cultivate cybersecurity talent.
Read More
B 10 18 22 Abnormal for Manufacturing
Attackers go after manufacturers to steal data, engage in corporate or nation-state espionage, and commit financial fraud. Learn how Abnormal protects manufacturers.
Read More
B 10 05 22 Cloud Email Security Strategy Checklist
Determine what you need from a cloud email security platform and ensure you ask the right questions when evaluating potential solutions.
Read More
B NHS
The NHS is a magnet for cybercriminals, with 81% of organisations across the UK suffering a ransomware attack in the past year. Learn how Abnormal protects the NHS.
Read More
B 10 3 22 Technology Industry Solution Brief
Cybercriminals target technology companies for their data, their funds, and their connections to vendors, partners, and customers. Learn how Abnormal protects tech companies.
Read More
B 09 26 22 Legal Solution Brief
Criminals target legal organizations for sensitive data, launching increasingly sophisticated email attacks that are difficult to detect. Learn how Abnormal protects law firms.
Read More
Blog cybersecurity awareness month
It's important to take time to evaluate your email security practices, both for your employees and across your organization. These resources can help.
Read More
B 09 22 22 Government Solution Brief
Threat actors know that state and local governments have troves of data and access to critical operational processes. Learn how Abnormal protects state and local governments.
Read More
B 09 16 22 Kroenke Opt 1 V2
Together, Abnormal and Microsoft provide Kroenke Sports & Entertainment with a robust, efficient security solution that blocks advanced threats from reaching inboxes.
Read More
B Higher Education
Schools are increasingly popular targets for advanced email attacks that can cost millions to remediate. Learn how Abnormal protects colleges and universities.
Read More
B 09 14 22 Choice Hotels
With Abnormal automatically handling advanced email threats, Choice Hotels now uses its time to fortify the entire hospitality cybersecurity space.
Read More
B 09 13 22 Healthcare Solution Brief
Cybercriminals continuously target healthcare organizations via email to steal or ransom patient data. Learn how Abnormal protects healthcare organizations.
Read More
B 09 12 22 Retail Solution Brief
Threat actors exploit retailers' complex vendor ecosystems to launch email attacks seeking customer data and company funds. Learn how Abnormal protects retailers.
Read More
B Essential Guide
Discover common email security challenges, critical capabilities for cloud email security, and 10 considerations to shape your cloud email security strategy.
Read More
B 08 08 22 H2 Threat Report com
From January-June 2022, Abnormal found a 48% increase in email attacks, and 68.5% of the attacks included a credential phishing link.
Read More
B 07 22 22 Super Concept
Since Abnormal blocks advanced threats against SuperConcepts, employees and executives can focus on the future, growing their software and administrative service businesses to help Australians build their retirement funds.
Read More
B 07 22 22 DUDEK
With Abnormal, Dudek has safer inboxes and more time to focus on solving environmental challenges for its customers.
Read More
B 07 08 22 Financial Solutions Brief
Discover the AI-based email security platform that protects financial institutions from the full spectrum of email attacks.
Read More
B 07 19 22 2022 Email Security Trends
We surveyed 300 security leaders to discover what matters most to them when it comes to email security in the current threat landscape.
Read More
B 07 06 22 SANS Whitepaper
This SANS Protects white paper explores some of the most common threats to enterprise email and shares a few ways organizations can block malicious emails from entering their environment.
Read More
B 07 06 22 Sans Webinar B
In this on-demand webinar sponsored by Abnormal Security, you'll learn how cybercriminals execute email-based attacks and how your organization can strengthen your security posture to mitigate these threats.
Read More
B 06 01 22 Gone Phishing
In this webinar, Graham Cluley, cybersecurity expert and host of the Smashing Security podcast, and Abnormal Security CISO Mike Britton discuss the latest in phishing attacks.
Read More
B 05 16 22 Elara Caring
Elara Caring's CISO consistently saw employees struggle to sort authentic messages from email attacks. He knew there was a better solution to protect patient data and improve the employee experience.
Read More
B 04 08 22 Digital Everything Customer Story
Upon integration with Abnormal, a Fortune Global 500 financial services organization learned that not only had 11,000+ advanced email attacks per month been bypassing its secure email gateway but more than 70 of its vendors had compromised accounts.
Read More
B 03 21 22 CSC Customer Story
While CSC Generation has robust security measures in place, unfortunately, the same couldn't be said for their vendors. To mitigate the risk of payment fraud via compromised vendor accounts, the organization added Abnormal to their security stack and the results spoke for themselves.
Read More
B 04 14 22 CISCO Guide to Phishing
Because phishing emails target human behavior, create a sense of urgency, and appear to come from trusted senders, they can be incredibly difficult to detect. Stopping them before they reach employee inboxes is the key to staying safe.
Read More
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Read More
Everise case study cover
By mid-2021, Everise had more than 11,000 employees to meet new demand for outsourced services. But the shift to remote work brought new email security risks. “Our people are good at what they do, but they’re not email security specialists, and attackers know that."
Read More
Resource 03 COATS
With Abnormal layered over Microsoft Defender, Coats employees are free to focus on continuing the company’s 250-year tradition of innovation, rather than sorting through emails and trying to assess the risks.
Read More
Webinar phish soc cover
Most people believe that the SOC is on the front lines, defending the castles against the forces of darkness. And while that’s true, it’s never quite as heroic as we’d like it to be.
Read More
Fireside chat katz cover
Legitimate email communications often contain links and attachments, and employees need to click on those links and attachments to do their jobs. Unfortunately, securing the enterprise often means stopping employees from doing so in an effort to stop bad actors from gaining access to systems or stealing money.
Read More
Fortune 200 wealth cover
As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Read More
Gateway church cover
Gateway chose Abnormal Security because of its uncompromising approach to prevent the email attacks that matter most. In the two years since they've deployed Abnormal, Gateway has not experienced a successful advanced email attack.
Read More
Human element whitepaper cover
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.
Read More
Human element webinar cover 2
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data.
Read More
Key considerations webinar cover
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Read More
B Gartner Highlights 1
The Gartner Market Guide for Email Security explains what integrated cloud email security (ICES) solutions are and why they’re essential for modern enterprises. Download a copy now to learn why enterprises are moving away from the SEG.
Read More