Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Abnormal Security

Abnormal Security provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop socially-engineered and never-seen-before email attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, ransomware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation. Abnormal's API-based approach enables customers to get up and running in 15 minutes and can augment an SEG or be used standalone to enhance native Microsoft security protection. Abnormal Security is based in San Francisco, CA.

Our Website:

Latest Content From Abnormal Security

Whitepaper: CISO Guide to Business Email Compromise

by Abnormal SecuritySep 01, 2022

Business email compromise costs organizations $2.4 billion per year. These scams are the largest cybersecurity threat, accounting for nearly 35% of all losses due to cybercrime. Discover how these attacks trick your employees into sending money and valuable information, and what you can do to stop them.

Download this white paper, created by Dr. Eric Cole at Secure Anchor, to:

  • Learn what BEC is and which types cybercriminals use to attack
  • Discover why BEC attacks slip through existing security infrastructure
  • Receive tips on what to consider when evaluating a new email security solution

Fill out the form to receive your copy of the CISO Guide to BEC today.

Whitepaper: Augmenting Your Microsoft EOP and MDO Email Security Infrastructure

by Abnormal SecuritySep 01, 2022

How can you augment, rather than duplicate, the native security functionality present in Microsoft Office 365? The move to the cloud with Microsoft 365 has allowed companies to streamline email security investments and leverage the included email security provided by Exchange Online Protection (EOP) and Defender for Office 365. But this approach isn't perfect, and many companies have realized they need a solution to address advanced email attacks that continue to make it through M365's native security solutions.

Download the white paper to learn:

  • What native email protections are included in Microsoft 365
  • Which attacks are slipping through the cracks in native security
  • Why supplementing Microsoft 365 is the most cost-effective approach to closing the email security gap
  • How the API architecture and data science-based techniques in the Abnormal platform provides a differentiated approach to detect and stop socially-engineered threats

Fill out the form to receive your copy and learn why Abnormal and Microsoft are better together.

Research Report: 2022 Email Security Trends Report: Managing Risks Amidst the Changing Threat Landscape

by Abnormal SecuritySep 01, 2022

As enterprises shift to the cloud, many are experiencing a mismatch between their legacy security architecture and the needs of their cloud email environment. We partnered with Aimpoint Group to survey 300 security leaders, discovering what matters most to them when it comes to email security in the current threat landscape. Download the report to learn:

  • The challenges and opportunities that today's enterprise email security teams face
  • How organizations are securing email accounts and communications in a changing threat landscape
  • The obstacles preventing enterprise security teams from effectively defending against email-based threats
  • How leaders are thinking about evolving their email security strategy for the future

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:

Whitepaper: A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

by Abnormal SecuritySep 01, 2022

The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are central components of cybersecurity. But because threat actors understand human behavior, they know how to manipulate it to achieve their goals - stealing money and valuable information from organizations worldwide.

Download the white paper, written by behavioral scientist Steve Crimando to learn:

  • Why humans are the weakest link in a cybersecurity strategy
  • How the COVID-19 pandemic has changed human behavior
  • Which tactics are most used by cybercriminals to take advantage of the human element

Webcast: Vendors as Your Largest BEC Threat

by Abnormal SecurityJun 22, 2022

The tactics that worked for your business five years ago likely aren’t still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn’t emailing them about gift cards at 2:00 in the morning.

Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you’re prepared to defend against them.