Mimecast

Black Hat USA 2022 video walkthrough
In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …

Photos: Infosecurity Europe 2022, part 1
Infosecurity Europe 2022 opened its doors today at the ExCeL in London. Here’s a look at the event, the featured vendors are: Arctic Wolf Networks, Bridewell, Checkmarx, …

How QR code ease of use has broadened the attack surface
In this interview with Help Net Security, Neil Clauson, Regional CISO at Mimecast, talks about the threats of QR code phishing, explains the vulnerabilities of such technology …

Tips to mitigate public-key cryptography risk in a quantum computing world
Quantum computing is poised to transform the industry over the next decade. With its promise of breakthrough speed and power, it’s easy to understand why there is so much hype …

Egress hires Matt Biggin as VP of Engineering
Egress announced that it has hired Matt Biggin as its new VP of Engineering to scale and deliver its product roadmap. Biggin joins Egress from Mimecast, where he played a key …

Organizations believe they are ready for ransomware attacks
Over the past year there has been a dramatic rise in ransomware attacks, and while all organizations are a target, large enterprises are bearing the brunt – experiencing …

The antidote to brand impersonation attacks is awareness
In this interview with Help Net Security, Dirk Jan Koekkoek, VP, DMARC at Mimecast, talks about the growing threat of brand impersonation attacks, their increasing level of …
Egress hires Steven Malone as VP of Product Management
Egress hired Steven Malone as its new VP of Product Management to spearhead the ongoing development of its human layer security platform. Malone joins Egress from Mimecast, …
Query.AI expands its leadership team with two new appointments
Query.AI announced the expansion of its leadership team with the appointments of Rob Anderson as vice president of sales and Susan Vaillancourt as chief marketing officer …

If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?
Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …
Arctic Wolf partners with leading security vendors to strengthen worldwide security operations
Arctic Wolf announced the expansion of strategic partnerships with leading security vendors to easily extend the power of the Arctic Wolf Platform across the entire security …
Chris Riley joins Avanan as VP of Enterprise Sales
Avanan announced the appointment of Chris Riley as Vice President of Enterprise Sales. The addition of Riley to the leadership team further accelerates the company’s rapid …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility