Cyber Resilience Insights

SUBSCRIBE NOW

Security
Threat Intelligence for the 99% - Part 4: What Approach Do You Take?

You have options for threat intelligence. But how do you decide? Welcome to the latest ed… Read More >

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, including indicators on when an organization is read… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Jan 23, 2019

Security
How Do You Roll Out a Threat Intelligence Program?

You can do this. When you thi… Read More >

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may belie… Read More >

Malcolm Harkins

by Malcolm Harkins

Chief Security and Trust Officer, Cylance Inc

Posted Jan 22, 2019

Security
Cybercriminals Love Healthcare

Here's why this industry is no… Read More >

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of orga… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jan 21, 2019

Security
Threat Intelligence for the 99% - Part 3: When Is It Needed?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest editi… Read More >

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat intelligence (CTI) program. When thinking about the… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Jan 16, 2019

Security
Insider Threats Personified – Part 3: Patient Zero Un-Hero

Sometimes, bad things happen to people with the best intentions. This week in ‘Insi… Read More >

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and result in long-lasting reputational damage for your org… Read More >

Monica Gupta

by Monica Gupta

Product Marketing Manager

Posted Jan 15, 2019

Security
Survey: Cybersecurity at Work, By the Numbers

Findings of our survey show th… Read More >

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest … Read More >

Michael Madon

by Michael Madon

SVP & GM of Mimecast Security Awareness

Posted Jan 15, 2019

Popular Posts

Older Posts

Security

Cryptojackers Strike Again

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Read More >

Security

Mimecast Discovers Microsoft Office Product Vulnerability CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Read More >

Security

Threat Intelligence for the 99% - Part 2: Why is it Important?

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Read More >

Security

2019 Cybersecurity Trends to Watch

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Read More >

categories

Read More >

View More

Popular Posts