In cybersecurity, buzzwords come and go, often being replaced with new buzzwords while the market...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
How to Balance Productivity and Security in Your Email Environment
[Ask Me Anything Wrap-Up] On September 16, 2020, GreatHorn’s CEO, Kevin O’Brien, moderated an...
Two-Factor Authentication: A Critical Requirement for Any Software Application
You already know that any account you create is prone to being hacked, especially if the right...
SEG, IESS, and CESS: What You Should Know from Gartner’s 2020 Market Guide for Email Security
According to Gartner’s newly published Market Guide to Email Security, “Dramatic increases in the...
DMARC – Control Your Email Domains
As more employees work remotely, the more an organization’s vital infrastructure is at risk for...
Layering Security Awareness into Your Email Security Approach
Phishing attacks grow more sophisticated with each passing year. As technology advances, so does...
Advanced Threat Detection for Phishing Attacks
Advanced threat detection for phishing attacks is important to protecting your organization...