Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

CISO Guide to Business Email Compromise (BEC)

Receive tips on what to consider when evaluating a new email security solution

CISO Guide to Vendor Email Compromise (VEC)

In this white paper from Dr. Eric Cole at Secure Anchor, learn about the ways in which attackers are leveraging compromised accounts from vendors or partners to launch attacks designed to bypass traditional email security.

Q3 2021 Email Threat Report

In our quarterly threat report, Abnormal Security discovered that all types of advanced email attacks grew over the last few months, with significant increases in the number of brute force attacks.

Augmenting Your Microsoft Office 365 EOP and ATP Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of organizations globally now use Microsoft Office 365 (O365). This has supported an agile and fluid way of doing business.

eBook | Presented by Abnormal Security

CISO Guide to Vendor Email Compromise (VEC): The Risks of VEC and How to Stop It

Protect Your Organization. Stop Vendor Email Compromise. Do you know if that email from your vendor is actually from your vendor? Cybercriminals use compromised email accounts to commit invoice, payment and RFQ fraud. Traditional email security platforms can't catch these attacks because they come from real email accounts.