Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Hardening Microsoft 365 against new account takeover attacks Olesia Klevchuk (Director, Product Marketing) Account takeovers driven by phishing and credential-theft attacks are on the rise—and Microsoft 365 accounts are the top target, with 1 in 5 organisat... 4 weeks ago | 61 mins Abnormal Demo Day: Top 5 Ways Abnormal Secures Your Email Environment Gabriel Rebane, Group Technical Marketing Manager, Abnormal Security Across the millions of mailboxes monitored by Abnormal, we have yet to see a company that has not been targeted by an attack. Our research shows that ... 1 month ago | 29 mins Hardening Microsoft 365 against new account takeover attacks Olesia Klevchuk (Director, Product Marketing) Account takeovers driven by phishing and credential-theft attacks are on the rise—and Microsoft 365 accounts are the top target, with 1 in 5 organisat... 4 months ago | 61 mins Abnormal Demo Day: AC Transit Moves Security Forward with Abnormal Tas Jalali, Head of Cyber Security, AC Transit, Scott Harris, Sr. Prod. Mkt Mgr, Gabe Rebane,Tech. Mkt Mgr, Abnormal Security As a major regional transit provider serving about 200,000 customers daily, AC Transit must operate efficiently. To do so, they must protect employee... 2 months ago | 23 mins How to Defend against Microsoft Cloud Account Takeovers Curtis Wray and Sai Chavali, Proofpoint More than two-thirds of organizations are fighting cloud account takeovers in their environments. And practically everybody is facing credential compr... 4 months ago | 32 mins Troy Hunt on ATO: Account Takeovers as the Hidden Threat Troy Hunt, Cybersecurity & Data-Breach Expert, Mike Britton, CISO, Abnormal Security, and Tom Bechtold (Moderator) The average cost of a data breach is now $4.24 million. And 20% of all breaches are a result of compromised credentials. What makes matters worse is t... 5 months ago | 60 mins Case Study: Defend Against Email Fraud in Your Supply Chain Jeff Henze, Information Security Analyst, Nathan Thoenen, Security Engineer, Sara Pan, Sr. Product Marketing Manager Email fraud continues to be a top concern for CISOs in 2021 - especially email fraud within supply chains. So how can you better protect your company?... 2 years ago | 45 mins How HMRC fends off phishing attacks. Neil Hammet, Senior Product Evangelist, Email Fraud Defence The story behind how HMRC protects taxpayers from 99% of malicious spam. followed by a discussion of DMARC, Supply Chain Email Fraud, Email Fraud Defe... 2 years ago | 42 mins LIVE TALKS: Unpacking Business Email Compromise & Email Account Compromise Cheryl Tang, Product Marketing Director & Tony Paterra, VP of Product Management, at Proofpoint More money is lost to Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks than to any other cybercriminal activity. According t... 3 years ago | 33 mins Do's and Don’ts for Business Email Compromise (BEC) & Email Account Compromise Sara Pan, Sr. Product Marketing Manager of Proofpoint The financial losses associated with Business Email Compromise (BEC) and Email Account Compromise (EAC) continue to rise. The FBI reported losses of a... 3 years ago | 48 mins Load more