Resource center

Live upcoming webinars


Security as a Service – Technical Product Tour

Register Now More details

How Do You Know Your Email Security Is Working? (EMEA)

Register Now More details

How Do You Know Your Email Security Is Working?

Register Now More details

On-Demand Webinars

Security Practices

March 28, 2019
Why You Need Third-Party Solutions for Office 365
More details
January 31, 2019
Selecting Email & Web Security to Complement Office 365
More details
November 29, 2018
Phishing Security for Office 365
More details
October 11, 2018
Now is the time to revisit your email archiving needs
More details
June 28, 2018
Protecting Users from Business Email Compromise Attacks
More details
January 25, 2018
Is Your Web Security Working? How to Test and Tune Your Web Security
More details
December 19, 2017
Email Security Gap Analysis: How Do You Know Your Security Is Working?
More details
November 16, 2017
Why Deploy Email Archiving in the Cloud?
More details
July 19, 2017
Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
More details
April 11, 2017
Confronting the Ransomware Crisis: Best Practices for Securing Your Business
More details
March 01, 2017
Is It Time to Move Your Security to the Cloud?
More details
January 18, 2017
Email Security: Why It Probably Isn’t Working, and What To Do
More details

Understanding Threats

April 25, 2019
New Attack Vectors: How Threats Have Changed and How to Combat Them
More details
February 28, 2019
Top 5 Office 365 Phishing Kits
More details
October 25, 2018
Evasive Phishing Targeting Office 365: What You Need to Know
More details
October 11, 2018
Phishing: How to Protect from Today's #1 Threat
More details
September 20, 2018
“Fileless” Ransomware: The Next Big Thing?
More details
May 24, 2018
How Evasive Malware-as-a-Service is Changing Internet Security
More details
April 05, 2018
The Top 5 Downsides and Dangers of Cryptocurrency Mining
More details
February 22, 2018
Reducing the Risk of Phishing Attacks
More details
July 11, 2017
How Changing Malware is Changing Security
More details
May 18, 2017
Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
More details

Industry Surveys

September 20, 2018
IT Security: 2018 Benchmarking Survey
More details
July 26, 2018
IT Security in the UK & Ireland: 2018 Business Survey
More details
September 14, 2017
IT Security at SMBs: 2017 Benchmarking Survey
More details
March 15, 2017
IT Security in the UK: 2017 Business Survey
More details
 

New to Cyren Email Security?

Watch our product overview

 
   

Is your email security working?

Review findings of our gap analysis report

 
     

Technical questions about our product?

Sign up for a tour and Q&A session

 

Time for a test drive?

Request your free trial today

 

Recent blog posts

It’s Back! Facebook Cryptominer Worm Reemerges

by Maharlito Aquino and Kervin Alintanahin

Digmine Campaign Redux Back in 2017, we wrote a blog about a malware spreading on Facebook, which, it turns out, continues to be relevant …

Stop Guessing: Test Your Email Security for Real

by Duncan Mills

Do you keep seeing phishing emails getting through to users, and wish you could quantify how effective your email security is—or isn't? Email is the …

Phishing Targeting Real Estate Firms

by John Callon

For the last three years, stories about real estate hacking and particularly phishing have appeared with increasing frequency in newspaper and blog …

Apple Phishing Bait Has a Lot of Hooks

by Maharlito Aquino and Kervin Alintanahin

In general, a lot of phishing has been moving the embedded links the recipient is intended to click on from the body of the email into an …

Emotet: From a Banking Trojan to One of the Most Advanced Botnets

by Tinna Thuridur Sigurdardottir and Sarah Neubauer

Email Security Malware Threat Analysis

In 2014, the Emotet malware started as a banking Trojan targeting European bank customers. Back then, nobody expected this malware would evolve into …

Ransomware Overshadowed by Phishing, But It's Not Dead Yet

by John Callon

Industry Insights Malware Ransomware

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a …