Pre-Delivery Prevention of Phishing, the Future of Security for Cloud Email and Collaboration Suites New York—September 18, 2019 – Avanan, the leading security solut...
Pre-Delivery Prevention of Phishing, the Future of Security for Cloud Email and Collaboration Suites New York—September 18, 2019 – Avanan, the leading security solut...
Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...
Gartner recognizes a new segment of email security focused on filling gaps in existing advanced threat protection. “Protecting the perimeter” was the refrain for con...
Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...
Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers.
What’s more dangerous than hackers running amok in your corporate email? How about if they had global access to your salesforce.com account? Salesforce.com [$CRM] i...
Mimecast and Proofpoint customers might be susceptible to email attacks that other Office 365 and Gmail customers are not. Mimecast and Proofpoint were the premier ...
Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well...
This month marked the 23rd Black Hat conference. If you’ve never made the trip to Las Vegas, the event typically focuses on the technical aspects of the latest threa...
In yet another example of a phishing campaign impersonating Microsoft’s voicemail notification, we see an HTML attachment that leads to a credential-harvesting URL. ...
Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...
Hackers are using Microsoft Azure Blob Storage to specifically attack Office 365 admins to take over the Office 365 environment. Although windows.net phishing attack...
When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...
The average person interacts with HTML every day while surfing the internet. Unless they are a UX developer or designer, however, they probably shouldn’t expect to r...
See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...