Michael Landewe

Michael Landewe



what-is-CASB-ft

What Is a Cloud Access Security Broker (CASB)?

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats.

Read more

featured-image-reploy

Re:Ploy Email Chain Hijack Attack

Let’s say your organization has the best security. Your employees are trained to never fall victim to phishing. You have SSO and it’s very hard to take over your acc...

Read more

What-We-Learned-At-Blackhat-Featured

Lessons from Black Hat: End-to-End Security Culture

This month marked the 23rd Black Hat conference. If you’ve never made the trip to Las Vegas, the event typically focuses on the technical aspects of the latest threa...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

Blog Post2FWebinar Images (70)

Phishing Training for Employees: Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer r...

Read more

Spoofpoint

Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both P...

Read more

capital-caring-ft

Capital Caring: Avanan Cloud Security for Healthcare

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their fami...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

cloud account takeover featured

White Paper: Cloud Account Takeover

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against...

Read more

5 Phishing Attack Trends to Look out for in 2019

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we ...

Read more

Microsoft Advanced Threat Protection vs Avanan

Microsoft knows that Office 365's default security features are not enough to keep an organization protected, which is why they created Microsoft Advanced Threat Pro...

Read more

Was My Email Hacked? - When Phishing Succeeds

Before you continue reading, you should check to see if your email address is one of millions that has already been compromised: HaveIBeenPwned.com. An attacker coul...

Read more

Attack Report: Gmail Vulnerable to Nickname Impersonation Spearphishing

The Basics of the Nickname Email Spoof Attack We have trained our users to distrust a sender's nickname and validate an identity by looking at the original email add...

Read more

Blog Post2FWebinar Images (36).png

Avanan Partner Series: How Lastline Detects Malware

With each day bringing new and different threats, we are always seeking out the next-gen technology that can defend against these next generation attacks. This is th...

Read more

Blog Post2FWebinar Images (35).png

Can a CASB Protect you from Phishing or Ransomware?

"Is Avanan a CASB?"   After joining a recent CASB panel with the Cloud Security Alliance I found myself answering this question over and over again. The answer depen...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial