Top White Papers and Webcasts

  • XM Cyber has developed a technology that identifies and exposes all attack vectors. These include lateral movement from breach points to an organization's critical assets, otherwise left undetected by security controls. It delivers automated and continual simulation of red team activity and completes the cycle by providing recommendations for how best to remediate the security holes it has identified in a corporate network. See why Ovum thinks that the shortcomings of both the vulnerability management and …

  • Live Date: October 25, 2018 @ 2:00 p.m. ET / 11:00 a.m. PT Phishing has become an industry, with new methods appearing and new "dark web" services increasing the evasiveness and sheer volume of both mass and targeted phishing threats. Join Cyren's senior threat analysts as they explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing "industry" works today, and and align these developments with what is actually …