Business email compromise: We know it’s coming, we educate our
employees, and yet the schemes still succeed far too often. Mike
Britton, CISO of Abnormal Security, talks about why BEC schemes
are so pervasive - and how to envision and create a successful
In this eBook, learn more about:
How can you augment, rather than duplicate, the native security functionality present in Microsoft Office 365?
The move to the cloud with Microsoft 365 has allowed companies to streamline email security investments and leverage the included email security provided by Exchange Online Protection (EOP) and Defender...
As organizations have moved their email servers from on-premise systems like Microsoft Exchange to cloud services like Microsoft 365, the range of permutations of email security solutions has also increased. In this white paper, we provide an overview of the range of security options available to organizations, as...
Yes, you know they are coming. And yes, the fraudsters have raised their game. But that doesn't mean you can't stop socially engineered attacks before threat actors can pull off their scams. Mike Britton of Abnormal Security tells you how.
In this exclusive interview with Information Security Media Group, Mike...
There is little doubt that business email compromise is a prevalent and
financially damaging threat. By exploiting the relationships that people have
established with their executives, coworkers, and partners, these attacks dupe
both traditional email security tools and the humans they target. Stopping...