Cyber Resilience Insights

SUBSCRIBE NOW

Archiving
Zero-Down, End-to-End Migrations: Simple, Easy to Remember

Email migrations don’t have to be painful. It seems, since the beginning of email, … Read More >

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to -endor and now on-premises-to-cloud. While most of the version migrations were performed in-house, vendor-to-vendor migrations hav… Read More >

Shane Harris

by Shane Harris

Senior Director, Product Management

Posted Feb 19, 2019

Security
Phishing for Outlook

There seems to be a kit availa… Read More >

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help w… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Feb 18, 2019

Security
GandCrab Ransomware Attacks Exploit Valentine’s Day Wea…

This Valentine’s Day, yo… Read More >

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted Feb 14, 2019

Archiving
Feeling the Archive Love: TechValidate Survey Results

This Valentine’s Day, we’re offering thanks to our customers.   Developin… Read More >

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers. Legal and compliance teams struggle with how to b… Read More >

Emily Wojcik

by Emily Wojcik

Senior Manager of Global Marketing Campaigns

Posted Feb 14, 2019

Security
Threat Intelligence for the 99 Percent - Part 7: Stitching It Together

How do you put all the threat intelligence components together? Welcome to the latest edi… Read More >

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) feeds and tools and discussed how to identify and … Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Feb 13, 2019

Security
Insider Threats Personified – Infected, User Should Bew…

When it comes to cybersecurity… Read More >

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers … Read More >

Monica Gupta

by Monica Gupta

Product Marketing Manager

Posted Feb 12, 2019

Popular Posts

Older Posts

Security

Email Security for the Healthcare Industry: Time for a Checkup?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Read More >

Security

Preventing Attack-for-Hire Services

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Read More >

Security

Threat Intelligence for the 99 Percent - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More >

Security

5 Ways to Ingrain Cybersecurity Awareness into Your Business

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Read More >

categories

Read More >

View More

Popular Posts