Mimecast Blog

Security
Introducing the ROPEMAKER Email Exploit

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people… Read More >

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining… Read More >

Matthew Gardiner

by Matthew Gardiner

Senior Product Marketing Manager

Posted Aug 22, 2017

Archiving
Cloud Archiving for E-Discovery: Important Factors

How to Choose the Right File A… Read More >

How to Choose the Right File Archiving Solution  Choosing the right archiving software is critical to improving e-… Read More >

Tawya Louder

by Tawya Louder

Mimecast Contributing Writer

Posted Aug 21, 2017

Archiving
Tips for Improving Enterprise Archiving

A Few Important Steps on the P… Read More >

A Few Important Steps on the Path to Better Data Governance Properly archived data is essential for effective data gove… Read More >

Taylor  Sisk

by Taylor Sisk

Mimecast Contributing Writer

Posted Aug 17, 2017

Security
One Internet Minute, Millions of Opportunities for Cybercrime

High volumes of email and social media posts increase the risk of cybercrime Every minute… Read More >

High volumes of email and social media posts increase the risk of cybercrime Every minute, we’re handing hackers and other cybercriminals everything they need to take advantage of us. According to data published in the Business Insider, there’s a lot of opportunity for cybercrime in just one 60-sec… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Aug 16, 2017

Security
UK Data Protection Laws Update: How it affects US business

What you need to know about proposed updates to UK data protection bill. The UK Government… Read More >

What you need to know about proposed updates to UK data protection bill. The UK Government recently announced its intent to install a set of sweeping updates to existing data protection law to “reflect the changing nature and scope of the digital economy”. Earlier this summer, the Australian Governm… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Aug 09, 2017

Security
Prioritizing Cyber Resilience Preparedness

Cyber Resilience Preparedness:… Read More >

Cyber Resilience Preparedness:   Why it Needs to be a Priority Email-borne threats are on the rise. Surely, you ha… Read More >

Neil Murray

by Neil Murray

CTO and Co-Founder

Posted Aug 09, 2017

Popular Posts

Older Posts

Security

Transforming your Organization into a Cyber Resilience Team

Educating your entire organization on advanced security.  Cybersecurity isn’t just a concern for your IT department. In fact, every employee who accesses the cloud interacts with the Internet of Things or opens an email is an important member o…

Read More >

Security

Take 3: Email Security Risk Assessment Program

As promised in my last ESRA update blog, we are now ready to drop our third quarterly release on you. But before I get into the details of this ESRA report let me explain what the Mimecast Email Security Risk Assessment program is all about.  In…

Read More >

Security

Dear Modern Business: Sincerely Future Hacker

    Dear Modern Business: Sincerely Future Hackers In Mimecast’s SlideShare presentation, we want to share with you a view from a hacker into the modern day cadence, and help you understand how their minds work so you can be prepared for a…

Read More >

Security, Office-365

5 Reasons Why You Need Sync & Recover for Exchange and Office 365

  Sync & Recover intro   We at Mimecast are announcing a new archiving feature. It’s called Sync & Recover for Exchange and Office 365. Sync & Recover is designed to simplify the process of recovering email and other Exchange da…

Read More >

categories

Read More >

View More

Popular Posts