Contact company icon Add as a preferred source Download PDF version
Summary is AI-generated, newsdesk-reviewed
  • Abnormal AI enhances Microsoft 365 security with updated Security Posture Management product.
  • Automated prioritisation and remediation guidance improve protection against email vulnerabilities and misconfigurations.
  • Integration with Microsoft 365 provides continuous visibility of configuration risks, boosting defence capabilities.

Abnormal AI, the pioneer in AI-native human behaviour security, announced its updated Security Posture Management product, bringing AI-driven protection, automated prioritisation, and remediation guidance to customers’ Microsoft 365 environments. 

As Microsoft 365 environments become more complex, accidental misconfigurations are now a major cause of cloud email vulnerabilities. The growing number of applications, layered settings, and fragmented ownership create blind spots and accidental openings that threat actors like Midnight Blizzard have exploited in the past.

Microsoft 365 integration

The new Security Posture Management add-on continuously detects misconfigurations across users, apps

With deep Microsoft 365 integration and a proven ability to stop advanced email threats, Abnormal is ideally positioned to uncover these configuration risks.

The new Security Posture Management add-on continuously detects misconfigurations across users, apps, and tenants, giving security teams the visibility and control they need to stay ahead of attackers.

Thousands of organisations rely on Abnormal to stop email-based attacks like phishing and account compromise. But attackers are also exploiting misconfigurations to bypass phishing defenses,” said Evan Reiser, CEO of Abnormal AI.

Detect hidden risks

Because we already integrate deeply with Microsoft 365 to protect inbound email, we can extend our API-based architecture to detect these hidden risks. Security Posture Management gives security teams continuous visibility into misconfiguration risks across their entire Microsoft 365 environment,” continued Evan Reiser.

Key capabilities include:

  • Comprehensive Visibility: Continuously uncovers risky Microsoft 365 misconfigurations using CIS benchmarks and Abnormal threat intelligence.
  • Automated Prioritisation: Surfaces the most dangerous risks first by factoring in impact, prevalence, and environment.
  • Remediation Guidance: Provides clear, actionable fixes with no manual audits or scripting.

Additional Resources:

  • Visit Abnormal at Black Hat 2025: Abnormal will be showcasing new Security Posture Management capabilities throughout the week at the CyBRR Cafe, located in front of the Expo Hall at Mandalay Bay.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...