Latest Whitepapers

Protecting your content against cyber threats and data loss
How the Content Cloud safeguards your most valuable information Your business runs on content — but...

6-Step Cybersecurity Starter Guide for SMBs
Computers and the internet bring many benefits to small businesses, but this technology is not without...

Social Engineering Handbook: How to Take the Right Action
The aim of this handbook is to help introduce social engineering and its risks to every employee in the...

6 Signs Your Email Gateway Might Need Replacing
Our experts have looked at the 6 signs your email gateway might need replacing. Read our guide and squeeze...

NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...

PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...

Insider Risk: Shifting the Focus With Zero Trust
Zero Trust assumes no entity is implicitly trusted regardless of whether it is internal or external to...

Pervasive Protection: Enabling Secure Work From Anywhere
The new digitally transformed workplace consists of employees that expect to get their work done anywhere....

Lessons from REvil’s Return
Ransomware is not just another buzzword. It is a very real threat to businesses and educational institutions...

Strengthening Critical Infrastructure Security
Advances to critical infrastructure technology is opening the door to threat actors and cyber attacks...

You Got Phished, Now What?
Security leaders work hard to prevent successful phishing attacks. But, despite email security solutions...

Reduce Alert Fatigue in Your IT Environment
Security teams are tasked with managing a huge volume of alert logs, and this noise can overwhelm any...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.