Avanan Blog Cloud Security Tips


LinKRewrites Featured-1

URL Defense Link Rewrites: The Good, The Bad, and The Over-Promised

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in emails. Proofpoint's Targeted Attack Prote...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they...

Read more

Was My Email Hacked? - When Phishing Succeeds

Before you continue reading, you should check to see if your email address is one of millions that has already been compromised: HaveIBeenPwned.com. An attacker coul...

Read more

Blog Post2FWebinar Images (35).png

Can a CASB Protect you from Phishing or Ransomware?

"Is Avanan a CASB?"   After joining a recent CASB panel with the Cloud Security Alliance I found myself answering this question over and over again. The answer depen...

Read more

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breac...

Read more

450421681.jpg

Gmail Phishing Attack: How to Identify a Phishing Email in Gmail

Gmail Phishing is the most popular way for attackers to gain access to your Google Cloud. It can be difficult to keep up with all the methods for detecting phishing ...

Read more

why-not-mta-graphic.png

SaaS Email Security: 7 Reasons not to use an MTA Gateway

Don't change your email security. Change the way it is connected. With the massive adoption of Office 365 and G-Suite for corporate email, companies hoping to implem...

Read more

cyber-security-icon.jpg

The Legal Considerations of Moving Data to the Cloud.

January 28th is Data Privacy Day. To commemorate, we are holding an online panel discussion with Chantal Bernier and Todd Daubert of Dentons, the world’s largest law...

Read more

How Many Days is Zero-Day Malware?

  Yesterday Office 365 finally caught the piece of malware we've been using in our demos for the past 5 months. The bad news, however, is that it took us only five m...

Read more

1 2 3
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial