final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

In this short video, we show you how to easily monitor successful logins to Office 365 from outside the United States. Although employee logins from outside the US a...

Read more

proxy-featured

Why Proxies Cause Security Vulnerabilities

Proxies have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies have bec...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

Blog Post2FWebinar Images

GDPR US Equivalent: Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications...

Read more

SINET-featured

SINET Names Avanan a Top 16 Cybersecurity Innovator

New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology compan...

Read more

Blog Post2FWebinar Images (100)

What Are Botnets and How to Defend Against Them

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructur...

Read more

Prevent Phishing

Stop Phishing with Avanan's Anti-Phishing Software

In March of 2018, an employee at The Financial Services Information Sharing and Analysis center (FS-ISAC) clicked on a malicious link. From there, the phished email ...

Read more

Blog Post2FWebinar Images (91)

PhishPoint: New SharePoint Phishing Scam Affects an Estimated 10% of Office 365 Users

  Over the past two weeks, we detected (and blocked) a new SharePoint scam phishing attack that affected about 10% of Avanan's Office 365 customers. We estimate this...

Read more

Blog Post2FWebinar Images (87)

Fake Email Invoices: Why Office 365 Keeps Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguis...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a sim...

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the...

Read more

Blog Post2FWebinar Images (86)

What is Shadow IT and Why Does it Exist?

Despite its menacing name, the practice of Shadow IT—when employees work with unsanctioned software, hardware, or applications on personal or company devices—is as r...

Read more

What is a CASB infographic

What is a Cloud Access Security Broker (CASB)? | Infographic

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. What does a CASB do? Gartner ...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the fut...

Read more

Blog Post2FWebinar Images (70)

Phishing Training for Employees: Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer r...

Read more

ZeroFont-Phishing-Manipulating-Font-Size-to-Get-Past-Office-365-Security-Featured

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, whi...

Read more

definition-of-casb

What makes a good CASB (Cloud Access Security Broker)?

What is a CASB? I am attending the Gartner Security and Risk Management Conference this week, and both analysts and customers are seeing a change in the cloud securi...

Read more

baseStriker-Office-365-Security-Fails-To-Secure-100-Million-Email-Users-Featured

baseStriker: Office 365 Security Fails To Secure 100 Million Email Users

Update: Microsoft has repaired this vulnerability on 5/16/18, two weeks after we first reported it to them. We recently uncovered what may be the largest security fl...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery in 2019

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Spoofpoint

Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both P...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial