Other API Vendors Are a Fake Substitute for Email Security

There are two types of API-based email security solutions. One provides real security. The other is a knockoff. Let's explain:

Read more

How To Stop The Drip-Drip of Phishing

Have you heard that fabled water-faucet analogy?

Read more

The Five Tenants of True Protection

What does protection against the most virulent threats today look like? There are tons of measures to take to keep your organization secure. But incorporating these ...

Read more

Hackers Attach Malicious .exe Files to Teams Conversations

Microsoft Teams continues to grow in popularity. Teams counts 270 million monthly active Teams users; that's up a tidy 20 million from July 2021.

Read more

Attacks Rising, Demonstrate Need for Full-Suite Security

We know that email has long been the dominant attack vector.

Read more

How Is Your Email Security Performing?

Do you know how to measure how well your email security solution is performing? It can seem like a tall task. However, with our brand new calculator, we can figure o...

Read more

How Hackers Follow Up Successful Campaigns

When hackers find something that works, they keep going at it until it doesn't.

Read more

Hackers Find Success Spoofing Walgreens, Keep At It

Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.

Read more

What is URL Phishing?

A link is not always what it seems. Hackers have gone to great lengths to create convincing websites that look just like the real deal. Oftentimes, this is spoofing ...

Read more

Avanan Ranks Fourth on G2's List of Top Security Products

G2 announced their Best Security Products List of 2022.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial