The shift from on-premise email platforms to cloud email platforms has taken shape, with the...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
BREAKING NEWS: Massive Cyberattack Propagating via Redirector Domains and Subsidiary Domains
This article relates to an on-going phishing campaign, and the GreatHorn Threat Intelligence team...
Looking at the 2020 Election through the Lens of Cyber Security
Any organization involved in U.S. politics and elections - either directly or indirectly - is a...
Do Your Part: 8 Tips to Avoid Phishing Attacks
Phishing attacks are one of the most common security challenges that organizations and individuals...
10 Ways to Secure Your Work from Home Space
In the not too distant past, traditional work offices and co-working spaces were the norm, along...
Can We Continue to Function Without Facts?
In today’s world, disinformation is common, skewing reality from fiction. It’s a place where...
[Webinar Wrap-Up] Facts vs Deception: Today’s Phishing Attack Landscape
Missed our webinar? Don’t worry – we’ve still got you covered. On September 17, 2020, Holger...