<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">
Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

Dylan Press | July 18, 2018 | Filed Under: Blog | Read More »

Back in 2016 we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the initial re...

Blog Post2FWebinar Images (74)

What is a CASB?

Dylan Press | July 11, 2018 | Filed Under: Blog | Read More »

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. Gartner first defined the term Cloud Access ...

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Dylan Press | July 3, 2018 | Filed Under: Blog | Read More »

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the future of home ent...

Blog Post2FWebinar Images (70)

Why Employee Training Can't Solve The Phishing Problem

Michael Landewe | June 27, 2018 | Filed Under: Blog | Read More »

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer rely upon the en...

Blog Post2FWebinar Images (61)

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Yoav Nathaniel | June 13, 2018 | Filed Under: Blog | Read More »

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, which we are calli...

definition-of-casb

What makes a good CASB (Cloud Access Security Broker)?

Don Byrne | June 7, 2018 | Filed Under: Blog | Read More »

What is a CASB? I am attending the Gartner Security and Risk Management Conference this week and both analysts and customers are seeing a change in the cloud security marketplace. ...

Weaponizing-Google-Featured

How G Suite Is Weaponized By Hackers

Dylan Press | May 23, 2018 | Filed Under: Blog | Read More »

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

atp-featured

White Paper: Avanan vs Microsoft ATP

Dylan Press | May 22, 2018 | Filed Under: White Papers | Read More »

For approximately the same cost as Microsoft ATP, you can do much better. We break down Advanced Threat Protection's security features and compare them to the full-stack security p...

baseStriker-featured-1

baseStriker: Office 365 Security Fails To Secure 100 Million Email Users

Yoav Nathaniel | May 8, 2018 | Filed Under: Blog | Read More »

Update: Microsoft has repaired this vulnerability on 5/16/18 two-weeks after we first reported it to them We recently uncovered what may be the largest security flaw in Office 365 ...

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery

Dylan Press | April 27, 2018 | Filed Under: Blog | Read More »

How to handle ransomware, like any business decision, needs to be approached with ROI in mind. Is it better to invest in ransomware preventing technology or is the risk sufficientl...

Spoofpoint

Is Office 365 more secure without Proofpoint?

Michael Landewe | April 6, 2018 | Filed Under: Blog | Read More »

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email - a pretty basic phishing attack that bypassed both Proofpoint and...

8-considerations-featured

8 Security Considerations When Moving to Office 365

Don Byrne | March 30, 2018 | Filed Under: Blog | Read More »

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what you know about...

Reagan Attack Featured

The "Ronald Reagan" Attack Allows Hackers to Bypass Gmail's Anti-phishing Security

Yoav Nathaniel | March 22, 2018 | Filed Under: Blog, phishing | Read More »

We started tracking a new method hackers use to bypass Gmail's SPF check for spear-phishing. The hackers send from an external server, the user sees an internal user (For example, ...

Blog Post2FWebinar Images (52)

34 Cloud Security Terms You Should Know

Dylan Press | March 15, 2018 | Filed Under: Blog | Read More »

We hope you use this as a reference not only for yourself but for your team and in training your organization. Print this out and pin it outside your cubicle.

capital-caring-logo

Capital Caring: Avanan Cloud Security for Healthcare

Michael Landewe | March 6, 2018 | Filed Under: Blog, Case Studies | Read More »

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy and direct support of patients and their families. Over 650 e...

LinKRewrites Featured-1

Link Rewrites: The Good, The Bad and The Over-Promised 

Gil Friedrich | March 2, 2018 | Filed Under: Blog | Read More »

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in email. Proofpoint's Targeted Attack Protection (TAP), Mim...

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

Michael Landewe | February 21, 2018 | Filed Under: Blog | Read More »

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

cloud account takeover featured

White Paper: Cloud Account Takeover

Michael Landewe | February 8, 2018 | Filed Under: White Papers | Read More »

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against them.

cloud takeover protection featured

[Webinar] Cloud Takeover Protection

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly detect and protect against cloud takeover attacks using best-of-breed security in a single click.

securing cloud infrastructure featured

[Webinar] Securing Cloud Infrastructure

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly fill security gaps in your cloud infrastructure such as AWS and Azure using best-of-breed security in a single click.