Stellar Cyber collaborates with Mimecast to minimize email-based attack impacts

Stellar Cyber announced a new technology partnership with Mimecast, an email and collaboration security company. This powerful technology integration makes it easy for Stellar Cyber and Mimecast customers to swiftly mitigate the risk of damaging email-… Continue reading Stellar Cyber collaborates with Mimecast to minimize email-based attack impacts

LogRhythm integrates with Mimecast to defend users against email-based threats

LogRhythm and Mimecast’s integration will help organizations around the globe protect against modern cyberattacks. Organizations need the ability to correlate data from their disparate security products and services to distinguish the real threats from… Continue reading LogRhythm integrates with Mimecast to defend users against email-based threats

Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal Security, Adaptive Shield, Airgap, Akamai, Anomali, Arctic Wolf Networks, Aris… Continue reading Black Hat USA 2022 video walkthrough

Photos: Infosecurity Europe 2022, part 1

Infosecurity Europe 2022 opened its doors today at the ExCeL in London. Here’s a look at the event, the featured vendors are: Arctic Wolf Networks, Bridewell, Checkmarx, Cisco, CrowdStrike, Cybereason, Hornetsecurity, (ISC)², Mimecast, Netskope, … Continue reading Photos: Infosecurity Europe 2022, part 1

How QR code ease of use has broaden the attack surface

In this interview with Help Net Security, Neil Clauson, Regional CISO at Mimecast, talks about the threats of QR code phishing, explains the vulnerabilities of such technology and how to make sure not to fall prey to such attack. The pandemic has resur… Continue reading How QR code ease of use has broaden the attack surface

Tips to mitigate public-key cryptography risk in a quantum computing world

Quantum computing is poised to transform the industry over the next decade. With its promise of breakthrough speed and power, it’s easy to understand why there is so much hype around this new technology. But we must also consider the new cybersecurity … Continue reading Tips to mitigate public-key cryptography risk in a quantum computing world

Organizations believe they are ready for ransomware attacks

Over the past year there has been a dramatic rise in ransomware attacks, and while all organizations are a target, large enterprises are bearing the brunt – experiencing an average of 10,000 attacks over the past two years. This is according to a… Continue reading Organizations believe they are ready for ransomware attacks

Query.AI expands its leadership team with two new appointments

Query.AI announced the expansion of its leadership team with the appointments of Rob Anderson as vice president of sales and Susan Vaillancourt as chief marketing officer (CMO). Anderson and Vaillancourt, both seasoned cybersecurity executives, are res… Continue reading Query.AI expands its leadership team with two new appointments