history-of-phishing-feat

The History and Future of Phishing [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with phishing and its damages. Learn about the...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable in 2020?

Secure Email Gateways were designed to secure on-prem email environments. In this capacity they were highly effective. As email has moved to the cloud, Secure Email ...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive information, or infiltrate ...

Read more

featured-image-reploy

Re:Ploy Email Chain Hijack Attack

Let’s say your organization has the best security. Your employees are trained to never fall victim to phishing. You have SSO and it’s very hard to take over your acc...

Read more

Patent-Gil-featured

The Future of Email Security

Avanan was recently granted a U.S. patent for one of its core technologies: the ability to apply inline security via API. That means Avanan blocks advanced threats (...

Read more

Gartner-Customers-Choice-featured-image

Avanan Recognized as a 2019 Gartner Peer Insights Customers' Choice for Email Security

  New York—September 24, 2019 – Avanan, a leading cloud email security platform, has been named a September 2019 Gartner Peer Insights Customers’ Choice for Email Se...

Read more

PRESS-RELEASE-FEATURED-IMAGE

Avanan Email Security Granted US Patent

Pre-Delivery Prevention of Phishing, the Future of Security for Cloud Email and Collaboration Suites New York—September 18, 2019 – Avanan, the leading security solut...

Read more

4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

5 Reasons Microsoft Safe Links Make Office 365 Less Safe

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Cloud-Email-Security-Supplements-Address-SaaS-Vulnerabilities-Featured

Cloud Email Security Supplements Address SaaS Vulnerabilities

Gartner recognizes a new segment of email security focused on filling gaps in existing advanced threat protection. “Protecting the perimeter” was the refrain for con...

Read more

Phishing-Attacks-and-the-Human-Factor-Featured-Image

Phishing Attacks and the Human Factor

Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized by Hackers in 2019

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

salespharce-featured-image

SalesPharce: Hackers Exploit Salesforce, Phish Partners and Customers

What’s more dangerous than hackers running amok in your corporate email?  How about if they had global access to your salesforce.com account? Salesforce.com [$CRM] i...

Read more

Mimecast-vs-Proofpoint-Why-They-Cant-Secure-Office-365-and-Gmail-Part-1-Featured

Mimecast vs. Proofpoint: Why They Can't Secure Office 365 and Gmail

Mimecast and Proofpoint customers might be susceptible to email attacks that other Office 365 and Gmail customers are not.  Mimecast and Proofpoint were the premier ...

Read more

Proofpoint-and-Mimecasts-Insider-Threat-Problem-Featured

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well...

Read more

What-We-Learned-At-Blackhat-Featured

Lessons from Black Hat: End-to-End Security Culture

This month marked the 23rd Black Hat conference. If you’ve never made the trip to Las Vegas, the event typically focuses on the technical aspects of the latest threa...

Read more

Metamorph-Featured-Image

MetaMorph HTML Obfuscation Phishing Attack

In yet another example of a phishing campaign impersonating Microsoft’s voicemail notification, we see an HTML attachment that leads to a credential-harvesting URL. ...

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips for Employees in 2019

Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...

Read more

Validator-Featured-Image

Office 365 Credential Validator Phishing Attack

Hackers are using Microsoft Azure Blob Storage to specifically attack Office 365 admins to take over the Office 365 environment. Although windows.net phishing attack...

Read more

Why-Multi-Factor-Authentication-Isnt-Foolproof-Featured

Why Multi-Factor Authentication Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...

Read more

Watch-Out-for-HTML-Attachments-the-Latest-Phishing-Trend-Targeting-Office-365-Featured

HTML Attachments: The Latest Phishing Trend Targeting Office 365

The average person interacts with HTML every day while surfing the internet. Unless they are a UX developer or designer, however, they probably shouldn’t expect to r...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial