-
Maximizing Mimecast: Are You Getting the Most Out of Your Email Security?
You've invested in Mimecast to protect your organization, but is your configuration working as hard as it could be? That's the question behind our new Maximizing Mimecast series: a collection of Product Optimization Guides designed to help you close common configuration gaps and get the full value from your Mimecast…
-
Amazon Password Reset Callback Campaign Exploits Legitimate Notification Infrastructure: 7 April 202
Key Points Threat actors sent approximately 67k callback messages across the first three weeks of March using genuine Amazon password-recovery notifications Campaign exploits legitimate Amazon SES infrastructure with valid DKIM authentication Forwarding chain through Proton and Microsoft 365 SRS amplified single message to…
-
Mimecast Human Risk Public API: Unlock Human Risk Insights Across Your Security Operations
Security teams have no shortage of tools—or data. Their workdays are marked by endless context-switching, fragmented visibility, and workflows that rarely connect the dots. According to the IBM Institute for Business Value, the average organization now juggles 83 different security solutions from 29 vendors—that’s a level…
-
Protect High-Value Data and Control Shadow AI Across Every Browser with Incydr for Firefox
The Firefox browser is now supported for Incydr’s monitoring and available adaptive controls like Block by Source and Block by Destination. Every browser your employees use is a potential exfiltration path. An engineer drags proprietary source code into an unsanctioned AI tool. A finance analyst pastes customer records…
-
AI-Powered Phishing Simulations: From Bottleneck to Breakthrough
In the ever-evolving landscape of cyber threats, phishing attacks have taken on a brand new sophistication. With the advent of generative AI tools like FraudGPT and PhishGPT, attackers can now craft highly convincing, targeted phishing emails at scale—mimicking trusted brands, exploiting psychological triggers,…
-
Create Effective Phishing Simulations with the Engage AI Phishing Template Generator
As explored in our previous post, AI-powered phishing techniques, including email phishing and deepfake scams, are becoming increasingly sophisticated. To counter these threats, we created the AI phishing template generator. This post explores how to use our new tool more effectively by concentrating on realism, ethical…
-
Simplifying Human Risk Access Control with Pre-Configured Roles
Managing who sees what matters—now it's easier than ever. At Mimecast, we believe the right people should have access to the right tools—and only those tools. When it comes to the Human Risk Command Center (HRCC), that principle takes on added weight. Human risk data is sensitive by nature: it reflects individual employee…
-
Introducing the New Mimecast End User Portal!
April 7 Update: Email Continuity is now live in the Mimecast End User Portal, alongside the existing Archive Search functionality. This gives end users access to a live inbox - with full send capability - during primary system outages. More end-user features are on the way. — We're excited to announce the launch of the…
-
Notifications from Mimecast about service degradation
We’re currently experiencing issues with the United States B Grid, specifically with inbound email being deferred. This is actively impacting our business operations. What’s concerning is that the Mimecast status page has not been updated to reflect any service degradation. However, a support ticket response confirmed that…
-
Your Collaboration Data Has a Compliance Problem. Here’s How We’re Solving It
When we talk to customers, the same themes keep coming up. Data is exploding beyond email. Investigations are getting more complex. Compliance timelines are tightening. And somewhere in the middle of all of that is a team of legal, compliance, and IT professionals trying to hold it all together, often with tools that…