Business Email Compromise (BEC) scams are expected to explode in volume and profitability as attacks bypass traditional safeguards. Research on trends and tactics in BEC attacks, including variants, target victims, and precursor channels. Published March 2023.
Quantifies the direct costs borne by organizations in mitigating the phishing threat, and explores expectations about how phishing will change over the next 12 months. Commissioned by IRONSCALES.
Results of a market survey of security managers at organizations in the United States and United Kingdom using Microsoft 365 about phishing, business email compromise, and ransomware attacks. Commissioned by Cyren.
Explores how well organizations are prepared to address the threat of business email compromise. Highlights low readiness by many organizations today across people, process, and technology solutions. Sponsored by Mimecast, RPost, and SonicWall.
Webinar on reducing the risk of phishing and ransomware, hosted by Avanan.
Webinar on reducing the risk of phishing and ransomware, hosted by TitanHQ.
Cybersecurity challenges abound for organizations across the world, with phishing and ransomware critical threats to neutralise. A survey report on a primary market research survey on how to reduce the reduce the risks of both. Sponsored by Avanan, KnowBe4, Mimecast, Octree Limited, SlashNext, Spamhaus Technology, TitanHQ, and Trend Micro.
Cybersecurity challenges abound for organizations across the world, with phishing and ransomware critical threats to neutralise. An investigation into how to reduce the reduce the risks of both. Sponsored by Avanan, KnowBe4, Mimecast, Octree Limited, SlashNext, Spamhaus Technology, TitanHQ, and Trend Micro.
Exploring findings from a recent survey on security performance, the most prevalent models for SOCs, SIEM integration, how the migration to Microsoft 365 was managed, types of additional security they’ve deployed, time spent remediating breaches, security budget growth, and how users report suspicious emails, along with expectations on new defensive technologies and services. Sponsored by Cyren.
The network in most organizations has a dramatically expanded attack surface. There is no longer a defensible perimeter that can fully protect corporate data, and so new approaches, technologies and practices are needed to protect corporate data and finances. Sponsored by Agari, Carbon Black, GoSecure, KnowBe4, MDaemon, Proofpoint, SlashNext, Trend Micro, Trustwave and Zix