Scroll down for more information

Live Webinar Events

  • Wednesday
    May 03, 2017

    Is It Time to Move Your Security to the Cloud?

    Wednesday, May 3

    15:00 BST | 16:00 CEST

    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    Join our live webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.

    Register Now
  • Tuesday
    April 11, 2017

    Confronting the Ransomware Crisis: Best Practices for Securing Your Business

    Tuesday, April 11

    2:00 PM ET | 11:00 AM PT

    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Join us on this live webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.

    Register Now
  • On-demand Webinars

    View our on-demand webinars to learn more about Cyren Internet security solutions and industry trends, along with how Cyren can help your organization enhance and differentiate your security offerings.

  • March 15, 2017

    IT Security in the UK: 2017 Business Survey

    More details
  • March 01, 2017

    Is It Time to Move Your Security to the Cloud?

    More details
  • January 18, 2017

    Email Security: Why It Probably Isn’t Working, and What To Do

    More details
  • December 07, 2016

    BOTNETS: THE CLONE ARMIES OF CYBERCRIME

    More details
  • November 15, 2016

    HOW HACKERS ARE MAKING YOUR SECURITY OBSOLETE WITH HYPER-EVASIVE MALWARE

    More details
  • October 04, 2016

    10 STEPS YOU CAN TAKE TO PROTECT YOUR BUSINESS FROM PHISHING ATTACKS

    More details
  • August 24, 2016

    A DEEP DIVE ON PHISHING, TODAY’S #1 BUSINESS THREAT

    More details
  • July 20, 2016

    IT SECURITY AT SMBS: 2016 BENCHMARKING SURVEY

    More details
  • June 28, 2016

    WHY EVASIVE ZERO-DAY ATTACKS ARE KILLING TRADITIONAL SANDBOXING

    More details
  • June 16, 2016

    STOPPING EVASIVE MALWARE: HOW A CLOUD SANDBOX ARRAY WORKS

    More details
  • May 17, 2016

    A DEEP DIVE ON RANSOMWARE WITH THE CYREN SECURITY TEAM

    More details
  • April 20, 2016

    CONFRONTING THE RANSOMWARE CRISIS: BEST PRACTICES FOR SECURING YOUR BUSINESS

    More details
  • March 23, 2016

    INSIGHTS FROM CYREN'S 2016 CYBERTHREAT REPORT

    More details
  • February 17, 2016

    IS YOUR WEB SECURITY BROKEN? 10 THINGS YOU NEED TO KNOW

    More details
  • December 09, 2015

    DEPLOYING CLOUD-BASED WEB SECURITY AS YOUR FIRST/LAST LINE OF DEFENSE

    More details
  • November 04, 2015

    PREVIEW THE FINDINGS FROM CYREN'S NEWEST CYBER THREATS REPORTINSIGHTS FROM CYREN'S 2015 Q3 CYBER THREATS REPORT

    More details
  • October 06, 2015

    NETWORK WORLD SURVEY RESULTS: QUICKPULSE RESEARCH ON WEB SECURITY

    More details
  • September 02, 2015

    DISPELLING THE MYTHS ABOUT CLOUD SECURITY

    More details
  • August 05, 2015

    INSIGHTS FROM CYREN'S 2015 Q2 CYBER THREATS REPORT

    More details
  • June 18, 2015

    EFFECTIVE CYBER SECURITY FOR HEALTHCARE

    More details
  • June 16, 2015

    EXPLORING INTERNET SECURITY FOR TODAY'S CYBER THREATS LANDSCAPE

    More details
  • May 06, 2015

    INSIGHTS FROM CYREN'S 2015 Q1 CYBER THREATS REPORT

    More details
  • March 03, 2015

    INSIGHTS FROM CYREN'S 2015 CYBER THREATS YEARBOOK

    More details
  • February 26, 2015

    THAT'S THE WAY THE NETWORK PERIMETER CRUMBLES: WEB SECURITY FOR THE NEW TECHNOLOGY PARADIGM

    More details
  • January 28, 2015

    CAN A LIGHT BULB REALLY POSE A SECURITY THREAT? A PRACTICAL LOOK AT INTERNET OF THINGS AND CYBERSECURITY

    More details