Native vs SEG vs ICES: What You Need to Know About Email Security
The shift from on-premise email platforms to cloud email platforms has taken shape, with the...
Microsoft 365: You’ve Migrated, So What Can You Optimize?
Over the years, Microsoft has made its cloud offerings more attractive, motivating more and more...
How Email Security Can Align to the MITRE ATT&CK Framework
In our previous post, What is the MITRE ATT&CK Matrix, we explained what the matrix is and how...
What is the MITRE ATT&CK Framework?
The MITRE ATT&CK Framework is a complete knowledgebase of tactics and techniques cyber...
Can We Continue to Function Without Facts?
In today’s world, disinformation is common, skewing reality from fiction. It’s a place where...
How to Balance Productivity and Security in Your Email Environment
[Ask Me Anything Wrap-Up] On September 16, 2020, GreatHorn’s CEO, Kevin O’Brien, moderated an...
SEG, IESS, and CESS: What You Should Know from Gartner’s 2020 Market Guide for Email Security
According to Gartner’s newly published Market Guide to Email Security, “Dramatic increases in the...
5 Ways to Reduce the Attack Surface of Your Cloud Email Environment
An attack surface is the sum of all the different attack vectors a threat actor can exploit to...
4 Things to Consider When Evaluating Automated Phishing Response Tools
This is the first in a series of five blog posts exploring how to evaluate anti-phishing tools. As...