Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Abnormal Demo Day: Why Security Posture Management is Crucial for Cloud Email Anthony Coggins, Sr. Manager, Security Operations, Acrisure & Mick Leach, Security Operations Manager, Abnormal Security Cloud email platforms are a cornerstone of an organization’s digital environment. The ability to integrate mission-critical third-party applications a... 2 days ago | 36 mins 2022 Fraud Trends & Technology Corey Lynch, Colin Parsons With the continuing rise in digital banking and increased demand for consumer convenience, 2022 saw significant challenges as fraudsters capitalized o... April 5, 2023 4:30pm Abnormal Demo Day: Top 5 Ways Abnormal Secures Your Email Environment Gabriel Rebane, Group Technical Marketing Manager, Abnormal Security Across the millions of mailboxes monitored by Abnormal, we have yet to see a company that has not been targeted by an attack. Our research shows that ... 4 weeks ago | 29 mins Tessian Product Tour for Admins and End Users Ashley Bull, Tessian Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while co... April 13, 2023 4:00pm The Art of the (Im)possible: Overcoming Business Email Compromise Stephen Doughtery, Financial Fraud Investigator, U.S. Secret Service and Crane Hassold, Dir of Threat Intel, Abnormal Sec. The 2013 Internet Crime Complaint Report released by the FBI didn’t even mention business email compromise. A year later it was the second most financ... 3 months ago | 33 mins Abnormal Demo Day with Choice Hotels Jason Stead, CISO, Choice Hotels, Jason Simpson, VP, Engineering, Choice Hotels, & Gretha Loubser, Product Mkt Mgr., Abnormal As one of the world’s largest lodging franchisors, Choice Hotels has a duty to protect the data of its 50 million members, guests, and employees. Hosp... April 20, 2023 4:00pm Myth of Cybersecurity: Identifying & Mitigating Cyber Attacks with Dr. Eric Cole Dr. Eric Cole, Founder and CEO, Secure Anchor Consulting Even with the best security measures in place, attackers are finding new ways in. Prevention is key, but believing that your organization has all the ... 1 month ago | 61 mins 5 Email Attacks to Watch For: How Threat Actors Are Targeting You Crane Hassold, Director of Threat Intelligence, Abnormal Security As organizations implement more advanced security tools, attackers have changed tactics. The email attacks of today are not what we saw a decade ago—o... 2 months ago | 53 mins Hardening Microsoft 365 against new account takeover attacks Olesia Klevchuk (Director, Product Marketing) Account takeovers driven by phishing and credential-theft attacks are on the rise—and Microsoft 365 accounts are the top target, with 1 in 5 organisat... 4 weeks ago | 61 mins How 4 Cybersecurity Companies Protect Against Cloud Vulnerabilities Ryan Kazanciyan, CISO, Wiz, Michael Mestrovich, CISO, Rubrik, Karl Mattson, CISO, Noname, Mike Britton, CISO, Abnormal Wiz. Rubrik. Noname. Abnormal. You know them as security companies that were created to provide superior cybersecurity protection against the most adv... April 11, 2023 5:00pm Load more