Resource Center

Live Webinare


IT Security in the UK & Ireland: 2018 Business Survey

Jetzt anmelden Mehr Infos

“Fileless” Ransomware: The Next Big Thing?

Jetzt anmelden Mehr Infos

Webinar-Aufzeichnungen auf Deutsch


Warum „on-premises“ Lösungen aktuellen Angriffen nicht standhalten

Jetzt ansehen Mehr Infos

Weitere Webinar-Aufzeichnungen auf Englisch

Security
Practices

June 28, 2018
Protecting Users from Business Email Compromise Attacks
More details
January 25, 2018
Is Your Web Security Working? How to Test and Tune Your Web Security
More details
December 19, 2017
Email Security Gap Analysis: How Do You Know Your Security Is Working?
More details
November 16, 2017
Why Deploy Email Archiving in the Cloud?
More details
July 19, 2017
Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
More details
April 11, 2017
Confronting the Ransomware Crisis: Best Practices for Securing Your Business
More details
March 01, 2017
Is It Time to Move Your Security to the Cloud?
More details
January 18, 2017
Email Security: Why It Probably Isn’t Working, and What To Do
More details
October 04, 2016
10 Steps You Can Take To Protect Your Business From Phishing Attacks
More details
June 16, 2016
Stopping Evasive Malware: How A Cloud Sandbox Array Works
More details
April 20, 2016
Confronting The Ransomware Crisis: Best Practices For Securing Your Business
More details
February 17, 2016
Is Your Web Security Broken? 10 Things You Need To Know
More details

Understanding
Threats

May 24, 2018
How Evasive Malware-as-a-Service is Changing Internet Security
More details
April 05, 2018
The Top 5 Downsides and Dangers of Cryptocurrency Mining
More details
February 22, 2018
Reducing the Risk of Phishing Attacks
More details
July 11, 2017
How Changing Malware is Changing Security
More details
May 18, 2017
Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
More details
December 07, 2016
Botnets: The Clone Armies Of Cyber Crime
More details
November 15, 2016
How Hackers Are Making Your Security Obsolete With Hyper-Evasive Malware
More details
August 24, 2016
A Deep Dive On Phishing, Today's #1 Business Threat
More details
June 28, 2016
Why Evasive Zero-Day Attacks Are Killing Traditional Sandboxing
More details
May 17, 2016
A Deep Dive On Ransomware With The Cyren Security Team
More details

Industry
Surveys

September 14, 2017
IT Security at SMBs: 2017 Benchmarking Survey
More details
March 15, 2017
IT Security in the UK: 2017 Business Survey
More details
July 20, 2016
IT Security At SMBs: 2016 Benchmarking Survey
More details
March 23, 2016
Insights From Cyren's 2016 Cyber Threat Report
More details

Gehen Sie den ersten Schritt in Richtung einer besseren Sicherheit für Ihr Unternehmen

Websicherheits-Diagnose

Identifizieren jetzt mit dem kostenlosen Online-Websicherheitstest von Cyren Sicherheitslücken. In weniger als 30 Sekunden wissen Sie, ob Sie bezüglich Cyberbedrohungen anfällig sind – von Malware über Phishing-Angriffe bis hin zu Botnets.

TESTEN SIE IHRE WEBSICHERHEIT
Email Security Gap-Analyse 

Cyren hat 11,7 Millionen eingehende E-Mails in Unternehmen untersucht und dabei diverse E-Mail-Sicherheitslösungen verwendet, um mögliche „Sicherheitslücken“ in deren Schutz zu messen. Laden Sie den zusammenfassenden Bericht herunter.

Aktuelle Blog Artikel

Cryptocurrency Exchange Targeted by Fake Phishing Site

von Maharlito Aquino and Kervin Alintanahin

With the news about the Israeli Bancor heist breaking recently (in which cryptocurrencies worth $23.5 million were stolen using a compromised …

Data Breach Report Underscores Phishing Risk for Manufacturers

von John Callon

The business impact of phishing is becoming increasingly more pronounced. According to the recently released 2018 Verizon Data Breach Investigations …

Why is the security industry telling you that your users should protect themselves?

von Duncan Mills

I’m a technology marketer, and the annual Infosecurity and RSA security events are an opportunity for me to understand what my peers and competitors …

Double Deceit: Bad Things Come in Pairs

von Maharlito Aquino and Kervin Alintanahin

The chinese proverb may say that good things come in pairs, but in what appears to be a clever bit of social and technical engineering, we’ve …

Cybercriminals see real estate firms as profitable

von John Callon

For the last two to three years, stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper …

Cyber pirates targeting logistics and transportation companies

von John Callon

In June of 2017, the logistics and transport industry experienced a ‘first’ when almost 80 ports and terminals around the globe either came to a …