Keep up with the latest news in cybersecurity with insight from our team of experts.
Inside the Fault Tolerant Scoring Cover
How Abnormal engineered a resilient, self-healing AI detection platform that maintains high precision even when dependencies fail.
Read More
B Cyber Savvy BSI
Discover how BSI CISO Mike Pitman is advancing cyber resilience in the face of AI threats, zero-day vulnerabilities, and budget constraints—while supporting a sustainable future for security.
Read More
B SOC Unlocked S 2
Discover key takeaways from the Season 2 premiere of SOC Unlocked, featuring Patti Titus, Field CISO at Abnormal AI, as she shares insights on cyber leadership, human risk, AI, and building a resilient security career.
Read More
B AI Trust
Discover why transparency is essential to AI adoption in the SOC. Learn how trust, governance, and model explainability are shaping the future of cybersecurity operations.
Read More
Black Hat Product Launch Cover
Abnormal AI announces Security Posture Management for Microsoft 365, international expansion, and Email Security product innovations at Black Hat 2025.
Read More
Security Posture Management M365
Secure your Microsoft 365 environment with AI-driven Security Posture Management guided by threat intelligence. Detect and remediate misconfigurations before attackers weaponize them to gain access or escalate privileges.
Read More
Hard Truths Ai That Works Cover
Catch up on major insights, top sessions, and full on-demand access from Abnormal Innovate: Summer Update, the summit on the future of AI email security.
Read More
Weaponized Trust pptx
Vendor email compromise (VEC) exploits trusted partners to defraud organizations. Learn how AI-powered email security detects supply chain threats other tools miss.
Read More
B College Athletics Email Attacks
College athletic programs are prime targets for email attacks. Learn how threat actors exploit them—and how Abnormal AI stops attacks before they spread.
Read More
B Human SOC AI
Discover how human-centered AI is transforming the modern SOC—reducing analyst burnout, improving threat detection, and enabling more strategic operations.
Read More
Tool Shell Cover
A newly discovered zero-day is affecting on-prem SharePoint environments. Here’s what CISOs need to know.
Read More
Gartner Peer Insights Customers Choice 2025 Cover
Abnormal AI has been named a 2025 Gartner® Peer Insights™ Customers’ Choice for Email Security Platforms, based entirely on feedback from IT and security professionals. Learn how real users rated Abnormal across key criteria including deployment, support, and product capabilities.
Read More
B Retail Industry Attack Trends Blog
New research reveals predictable seasonal cybersecurity patterns in retail. Discover when attacks are most prevalent and how to synchronize defenses with threat cycles.
Read More
B Multi Party Scam
Discover how multi-party attacks unfold and how to stop them before they cause damage to your organization.
Read More
Engineering Hyper Personalized Security Training pptx 1
Explore how Abnormal AI rapidly engineered AI Phishing Coach, a hyper-personalized training platform, by leveraging GenAI, internal developer tools, and an AI-first build process designed for speed and scale.
Read More
Innovate Summer Update Announcement Blog Cover
Join Abnormal Innovate: Summer Update on July 17 to explore the future of AI-powered email security with bite-sized sessions, expert insights, and exclusive product reveals.
Read More
High Scale Aggregation Cover
At Abnormal AI, detecting malicious behavior at scale means aggregating vast volumes of signals in realtime and batch. This post breaks down how we implemented the Signals DAG across both systems to achieve consistency, speed, and detection accuracy at scale.
Read More
B CISO SAT
Discover how modern CISOs are evolving security awareness training from a compliance checkbox into a strategic, AI-powered program that drives behavior change and builds a security-first culture.
Read More
B Regional VEC BEC Trends Blog
Regional analysis of 1,400+ organizations reveals how geography shapes email security risks. See which regions are most vulnerable to VEC vs BEC.
Read More
B Healthcare
Discover how healthcare security leaders are defending against AI-powered threats. Learn why identity and email are the new frontlines—and what it takes to protect the human element.
Read More
B HTML and Java Script Phishing
Explore real phishing attacks that use HTML and JavaScript to bypass defenses and learn what makes these emails so hard to detect.
Read More
B Custom Phishing Kits Blog
Brand-specific phishing kits are replacing generic templates. Learn how these custom phishing kits enable sophisticated impersonation attacks.
Read More
10 Questions to Evaluate CES Cover
Explore 10 key questions to evaluate cloud email security solutions and uncover how AI-native behavioral intelligence can stop today’s most advanced email threats.
Read More
B Scattered Spider
Attacks rarely come through the front door anymore, and today’s actors use normal-sounding communications from legitimate suppliers as entry points. Behavioural AI can spot wider anomalies that legacy defences miss.
Read More
Loading...