Abnormal Blog/Author/Mike Britton
Abnormal Blog/Author/Mike Britton

Mike Britton
Chief Information Officer
Mike Britton is the CIO of Abnormal Security, where he leads the information security team, privacy program, and corporate AI strategy. He is integral in building and maintaining the customer trust program, performing vendor risk analysis, protecting the workforce with proactive monitoring of the multi-cloud infrastructure, and leading the implementation of AI-powered tools and processes to enhance employee efficiency and productivity. He also works closely with the Abnormal product and engineering teams to ensure platform security and serves as the voice of the customer for feature development.
Mike previously spent three years as the CISO of Abnormal Security. Prior to Abnormal, Mike spent six years as the CSO and Chief Privacy Officer for Alliance Data and previously worked for IBM and VF Corporation. He brings 25 years of information security, privacy, compliance, and IT experience from multiple Fortune 500 global companies. Mike holds an MBA from the University of Dallas and a BA in Political Science from the University of Mary Washington.

Data & Trends
Assets Under Attack: Email Threats Targeting Financial Services Jump 25%Jun 11, 2025

Data & Trends
2024 FBI IC3 Report: Business Email Compromise Remains a Multi-Billion Dollar ThreatApr 23, 2025

Data & Trends
Mission Interrupted: Nonprofits Face a Rising Wave of Email AttacksMar 5, 2025

Business Email Compromise
Why Gift Card Scams Are Getting Trickier to SpotDec 18, 2024

Data & Trends
Manufacturing Sector at Risk: Industry Faces Wave of Advanced Email AttacksNov 21, 2024

Artificial Intelligence
What the US Can Learn From the UK and EU About Regulating AINov 6, 2024

Data & Trends
Critical Condition: Spike in Email Attacks Targeting the Healthcare IndustryOct 8, 2024

CISO Insights
Cybersecurity Awareness Month: How CISOs Can Engage, Educate, and Empower Year-RoundOct 1, 2024

Data & Trends
Threats in Transit: Cyberattacks Disrupting the Transportation IndustrySep 12, 2024

Business Email Compromise
How BEC Attacks Are Evolving in the AI EraAug 1, 2024

Account Takeover
Why MFA Alone Will No Longer SufficeJul 18, 2024

Data & Trends
Phishing Attacks on State and Local Governments Surge 360%Jul 10, 2024

Attack Stories
Unpacking the Threat: UPS and FedEx Convincingly Impersonated in Phishing AttacksJun 26, 2024

Account Takeover
Protecting Against Cross-Platform Account TakeoverMay 23, 2024

Business Email Compromise
Key Takeaways from the 2023 FBI IC3 Report: Business Email Compromise Losses Jump to Nearly $3 BillionMar 7, 2024

Artificial Intelligence
CISO Chat(GPT): How Top Brands Are Using AI in CybersecurityMar 5, 2024

Data & Trends
Energy and Infrastructure Industry Sees Steady Growth in CyberattacksFeb 27, 2024

Credential Phishing
Hooked on Phishing: The 5 Most Popular Themes That Encourage Users to ClickFeb 20, 2024

Thought Leadership
Email Security Best Practices for 2024 (and Beyond)Jan 24, 2024

Artificial Intelligence
Uncovering AI-Generated Email Attacks: Real-World Examples from 2023Dec 19, 2023

Attack Stories
BazarCall Attack Leverages Google Forms to Increase Perceived CredibilityDec 13, 2023

Attack Stories
Disney+ Impersonated in Elaborate Multi-Stage Email Attack with Personalized AttachmentsDec 5, 2023

Attack Stories
Attackers Exploit Middle East Crisis to Solicit Fraudulent Cryptocurrency Donations for ChildrenNov 16, 2023

Attack Stories
Threat Actors Capitalize on Bittrex Bankruptcy to Launch Targeted Phishing AttackNov 9, 2023

CISO Insights
12 Strategic Career Tips for Aspiring CISOsOct 18, 2023

Business Email Compromise
Healthcare Organizations Experience 279% Increase in Business Email Compromise in 2023Sep 26, 2023

Artificial Intelligence
The Nigerian Prince is Alive and Well: Cybercriminals Use Generative AI and New Themes to Run Their ScamsSep 14, 2023

Credential Phishing
Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 BrandsAug 24, 2023

Attack Stories
VEC Attacks on Replay: Attackers Use the Same Message to Target Victims in Critical InfrastructureJul 26, 2023

Threat Intel
Lessons Learned from Last Week’s Email Breach on Federal AgenciesJul 20, 2023

Email Platform Attacks
5 Security Risks of Collaboration ToolsJun 12, 2023

Business Email Compromise
3 Ways Cybercriminals are Targeting Your EmailJun 6, 2023

Vendor Email Compromise
An Overview of Vendor Risks: Tips for Vendor Procurement and Security AssessmentsJun 1, 2023

Attack Stories
Israel-Based Threat Group Launches Multi-Phase BEC Attacks Using an M&A LureMay 16, 2023

Account Takeover
World Password Day: The Perfect Opportunity for a Security Check-upMay 4, 2023

CISO Insights
CISO Fireside Chat Recap: Insights from 4 Cybersecurity LeadersApr 26, 2023

Email Platform Attacks
Beyond the Inbox: Protecting Against Collaboration Apps as an Emerging Attack VectorApr 20, 2023

Company & Culture
Identity Management Day: Why It Matters and How to CelebrateApr 11, 2023

Attack Stories
Stopping Vendor Email Compromise in Action: How Abnormal Detected a $36M AttackMar 22, 2023

Account Takeover
Keeping VIP Emails Safe: Why Your Executives Are Your Largest Security ConcernMar 21, 2023

Data & Trends
2022 FBI IC3 Report Shows $2.7 Billion in Losses from Business Email CompromiseMar 13, 2023

CISO Insights
Cybersecurity Predictions for 2023: Thoughts from Abnormal's CISODec 19, 2022

CISO Insights
Top Highlights and Takeaways from Our Modern Email Attacks SeriesNov 23, 2022

Thought Leadership
Protecting a Distributed Workforce from Cybersecurity ThreatsOct 20, 2022

Account Takeover
Understanding and Preventing Account Takeover AttacksAug 23, 2022

Thought Leadership
Email Attack Insights from the Top Names in CybersecurityJul 27, 2022

Credential Phishing
Webinar Recap: Blocking Phishing Attacks Before Employees BiteJul 25, 2022

Data & Trends
How to Mitigate Socially-Engineered AttacksApr 27, 2022

CISO Insights
The Rise of Social Engineering Success: What CISOs Need to KnowApr 19, 2022

Data & Trends
Tackling the Increasing Threat of PhishingApr 15, 2022