Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Featured Post

Latest Posts

19 Best Practices for Securing Microsoft Office 365

Microsoft Office 365 is a massive platform that many businesses use. It is considered the world's most popular office suite of productivity tools. Unfortunately, this means it is a hugely popular target for cyber-attackers as well.  Microsoft Office 365 has a variety...

What is Spyware?

Spyware is a type of malicious software that enters your computer or mobile device without consent in order to gain access to your personal information and data and relays it to a third party. Considered a type of malware, spyware spies on the computer user, capturing...

Cyren’s Email Security Engine for IP Reputation

The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions. Messaging security vendors can achieve...

Inbound Anti-Spam Solution: Catch Outbreaks with Cyren

The challenges of keeping up with the ever-changing tactics of spammers consume valuable hardware and internal personnel resources for service providers and vendors. Proven across multiple scores of deployments that happen across the globe, Cyren’s Email Security...

Anti-Phishing Software Solutions: What Are They?

We live in a fully digital world, where daily communication and business correspondence is done over email. While a multitude of benefits has come from this dependence on digital communication like increased productivity and efficiency, one threat persists, and it’s...

What is the Difference Between Vishing & Phishing Attacks?

Phishing attacks are an extremely common way hackers can gain access to your businesses’ sensitive or confidential information. In fact, 74% of organizations in the United States experienced a successful phishing attack. Additionally, millions of harmful site warnings...