Why Email Security Isn't Working

Back when email was on-premises, your email server sat somewhere in a data center, protected by your security stack that was designed specifically for on-prem email....

Read more

Cybercriminals Use Microsoft Sway to Phish Office 365 Security and Your Well-Trained Users

Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...

Read more

QR-Code-Attack-Featured

QReep: Sextortion campaign uses QR codes to link to bitcoin wallets instead of URLs

Avanan has uncovered a new sextortion attack that uses QR codes instead of URLs to avoid bitcoin wallet detection. To drive the attack, hackers claim they have foota...

Read more

Shadow-IT-Press-Release-Featured

Avanan Granted Cybersecurity Patent for Email-Based Shadow IT Discovery

USPTO recognizes unique capability for cloud services discovery and monitoring New York—December 17, 2019 – Avanan, the leading security solution for cloud-based ema...

Read more

Metamorph-Featured-Image

Update — HTML Attachment Attack on Office 365

This summer, we reported that hackers were bypassing Office 365 EOP and ATP with an ingeniously simple attack that uses HTML attachments in email to launch phishing ...

Read more

insider-pro-featured

INSIDER PRO REVIEW: How Avanan defends cloud- based email platforms

InsiderPro.com recently did a full review of the Avanan platform. The full review can be found on their website or can be downloaded below as a PDF.

Read more

5-Things-Everyone-Should-Know-About-the-2016-DNC-Email-Breach

5 Things Security Professionals Should Know About the DNC Email Breach

As we enter the 2020 election season, we are once again discussing the possibility of foreign intervention, which puts the 2016 hack of the Democratic National Commi...

Read more

2019-zero-trust-featured

2019 Was the Year of Zero Trust

Before the cloud, data was secured at the perimeter of applications and networks. Everything inside the perimeter was trusted, and everything outside the perimeter w...

Read more

Featured images

Guide to Email Security

Email is not secure by nature, because email was never meant to be secure. The way email is used today — and its security needs — differs greatly from what its inven...

Read more

homeland-security-featured

What Did the CISA of Homeland Security Say at Data Connectors?

This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...

Read more

what-is-CASB-ft

What Is a Cloud Access Security Broker (CASB)?

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats.

Read more

Featured images

What is Business Email Compromise (BEC)?

There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing as account ta...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable in 2020?

Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...

Read more

history-of-phishing-feat

The History and Future of Phishing [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial