Examples of Silver-Bullet Technology Fails
Most security teams today are pretty much in the same boat: limited budget, limited man power, and limited ...
Other content in this Stream
The Mimecast Email Security Assessment
GDPR - A Day of Reckoning or Transformation?
Cyber Resilience Planning for Email
Email Archiving - Time for an Update
There's More Than Just Security When It Comes to Office 365
In a global survey of 600 IT professionals, nearly half characterized themselves as “highly concerned” about email security gaps in Microsoft Office 365TM.
Avoid Costly Email Migration Pitfalls with Archiving Solutions
Moving email from legacy archive platforms can be the biggest obstacle when considering new, next-generation solutions.
Mimecast & Vanson Bourne Survey IT Leaders and Executives
Mimecast recently conducted global research with Vanson Bourne on the state of organizations' cybersecurity.
Making a Commitment to GDPR Compliance So Your Organization Can Too
Trust is an often-overused word. “Trust me” is easy to say, but much harder to demonstrate.
What's the Difference Between Cyber Security and Cyber Resilience?
While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing.
Understanding Encrypted Threats
Boston Pizza Case Study
2018 SonicWall Cyber Threat Report
What is MU-MIMO wireless technology?
With technologies like the Multi-User Multiple Input Multiple Output (MU-MIMO), increased channel width and more spatial streams (SS) than ever before, Wave 2 technology is a game-changer.
What's the Difference Between Traditional and Next-Generation Anti-Virus?
Over the past three years of the ransomware age, traditional signature-based anti-virus solutions have lacked the power to combat today’s flood of evasive malware.
Is Your Firewall Ready for the IoT Era?
The number of connected “things” that need to be secured continues to grow — cars, TVs, watches, wearables, refrigerators, security cameras. And these are just a few examples.
GDPR: Background, Context & FAQs
To help further educate and build awareness, please reference these answers to the most popular questions about GDPR.
New Threat Intelligence Shows Growing Malware Volume
The latest cyber attack data from SonicWall shows increases across the board for global malware, ransomware, TLS/SSL encrypted attacks and intrusion attempts.
HealthcareCompany Builds A Complete Phishing Defense
RSA SecurID - Keep Ahead of Growing Threats