Account Takeover Fraud , Anti-Phishing, DMARC , Business Email Compromise (BEC)

Redefining Cloud Email Security to Protect Against All Attack Types

Abnormal Security's Arun Singh on the new strategies needed for detection and defense
Arun Singh, Head of marketing, Abnormal Security

While using a cloud-based infrastructure yields significant benefits in terms of collaboration and agility, it also creates additional points of entry for attackers to exploit. And email is one of the largest culprits.

Arun Singh, Head of Marketing at Abnormal Security, recently shared why modern enterprises need an email security solution that provides inbound email attack protection and secures email infrastructure across every entry point.

In an interview with Information Security Media Group, Singh discusses:

  • The latest inbound email attack trends, including BEC
  • The emergence of novel email platform attacks
  • How Abnormal is redefining cloud email security with new Knowledge Bases to prevent both types of attacks

Singh is the Head of Marketing at Abnormal Security. Prior to joining Abnormal, he held leadership roles in product marketing, product management and engineering at notable companies including Okta, Cloudflare, Salesforce, Oracle and Sun Microsystems. He has more than 15 years of experience in the cybersecurity industry, with an in-depth understanding of network security, cloud security, infrastructure security, and identity and access management.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.