Archivio whitepaper

Argomenti più recenti:

How Security Culture Invokes Secure Behaviour

In this groundbreaking new research, KnowBe4 has been able to validate the link between security culture and secure behaviour. Though it has been suspected that the two are intertwined, until now, it has never been proven with ...

Visualizza whitepaper

Identify and Respond to Email Threats Faster with PhishER

Cybercriminals are always coming up with new, devious phishing techniques to trick your users. PhishFlip is a new PhishER feature that allows you to respond in real time and turn the tables on these threat actors. With PhishFli...

Guarda il webinar on-demand

Critical Considerations When Choosing Your Security Awareness Training Vendor

It’s become more and more evident to organisations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will delive...

Visualizza report

KnowBe4 Security Awareness Training Demo

Email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defence. Watch this on-demand demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training...

Maggiori informazioni

Networking with the Enemy: Understanding the Psychology of Social Engineering

Social engineering is a growing threat in today's digital world, where attackers use psychological manipulation to gain access to sensitive information. This talk will explore the psychology behind social engineering, and disc...

Guarda il webinar on-demand

Phishing Benchmark Report

As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up! IT security seems to be a race between effective techno...

Visualizza report

Communicating Cybersecurity Effectively in Your Organisation

Every industry has unique jargon and buzzwords, and cybersecurity is no different. The challenge faced by IT professionals across the globe is how to engage employees effectively in their role in making better online decisions....

Guarda il webinar on-demand

The CISO’s Guide: Attack Surface Management (ASM) - Episode 1

Attack Surface Management is not limited to the surface! Today, the stock of vulnerabilities has grown so fast that systematic correction of CVEs or misconfigurations is no longer possible. Continuing to struggle manually th...

Visualizza E-book

UNDERSTANDING AND IMPROVING YOUR CYBERSECURITY WITH MITRE ATT&CK:

MITRE ATT&CK to the rescue! Today, prioritizing 200,000+ vulnerabilities is humanly impossible. Lucky for us cybersec pros, the MITRE ATT&CK Framework has become the go-to standard, providing a structured approach to ...

Visualizza whitepaper

Cost savings and business benefits enabled by the CipherTrust Data Security Platform

As the IT landscape becomes increasingly complex, organizations must rethink their data security strategy to protect valuable customer data and remain compliant, to avoid putting their organizations at risk both financially and...

Visualizza whitepaper
Registrati alla newsletter
Le principali notizie, gratuitamente via mail