Mining Mimecast: brute forcing your way to success

As this is our first post we want to welcome you to the Schillings Cyber blog — glad to have you on board. Our aim is to share research and insights in to the everyday life of a unique cyber team within the consulting world. The team were deliberating for a while about what our first post should be. We wanted it to be impactful, practical, and to have pizazz. We went back and forth on ideas ranging from sharing some of our red teaming techniques to tearing down secure communications applications or tearing down some IoT devices. But, as with all great ideas, I randomly stumbled on something potentially interesting and thought to myself "I wonder if...".