Cyber Resilience Insights

SUBSCRIBE NOW

Security
Threat Intelligence for the 99 Percent - Part 8: Final Thoughts & Takeaways

Here’s what you need to know on your threat intelligence journey. Welcome to the 8t… Read More >

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to threat protection, detection and prevention is just b… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Feb 20, 2019

Archiving
Zero-Down, End-to-End Migrations: Simple, Easy to Remem…

Email migrations don’t h… Read More >

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pai… Read More >

Shane Harris

by Shane Harris

Senior Director, Product Management

Posted Feb 19, 2019

Security
Phishing for Outlook

There seems to be a kit availa… Read More >

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help w… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Feb 18, 2019

Security
GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valen… Read More >

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, but this year a group of cybercriminals have brought… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted Feb 14, 2019

Archiving
Feeling the Archive Love: TechValidate Survey Results

This Valentine’s Day, we’re offering thanks to our customers.   Developin… Read More >

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers. Legal and compliance teams struggle with how to b… Read More >

Emily Wojcik

by Emily Wojcik

Senior Manager of Global Marketing Campaigns

Posted Feb 14, 2019

Security
Threat Intelligence for the 99 Percent - Part 7: Stitch…

How do you put all the threat … Read More >

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog serie… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Feb 13, 2019

Popular Posts

Older Posts

Security

Insider Threats Personified – Infected, User Should Beware

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Read More >

Security

Email Security for the Healthcare Industry: Time for a Checkup?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Read More >

Security

Preventing Attack-for-Hire Services

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Read More >

Security

Threat Intelligence for the 99 Percent - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More >

categories

Read More >

View More

Popular Posts