Resource center

Live upcoming webinars

Security as a Service – Technical Product Tour

Register Now More details

Why You Need Third-Party Solutions for Office 365 (EMEA)

Register Now More details

Why You Need Third-Party Solutions for Office 365

Register Now More details

On-Demand Webinars

Security Practices

January 31, 2019
Selecting Email & Web Security to Complement Office 365
More details
November 29, 2018
Phishing Security for Office 365
More details
October 11, 2018
Now is the time to revisit your email archiving needs
More details
June 28, 2018
Protecting Users from Business Email Compromise Attacks
More details
January 25, 2018
Is Your Web Security Working? How to Test and Tune Your Web Security
More details
December 19, 2017
Email Security Gap Analysis: How Do You Know Your Security Is Working?
More details
November 16, 2017
Why Deploy Email Archiving in the Cloud?
More details
July 19, 2017
Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
More details
April 11, 2017
Confronting the Ransomware Crisis: Best Practices for Securing Your Business
More details
March 01, 2017
Is It Time to Move Your Security to the Cloud?
More details
January 18, 2017
Email Security: Why It Probably Isn’t Working, and What To Do
More details

Understanding Threats

February 28, 2019
Top 5 Office 365 Phishing Kits
More details
October 25, 2018
Evasive Phishing Targeting Office 365: What You Need to Know
More details
October 11, 2018
Phishing: How to Protect from Today's #1 Threat
More details
September 20, 2018
“Fileless” Ransomware: The Next Big Thing?
More details
May 24, 2018
How Evasive Malware-as-a-Service is Changing Internet Security
More details
April 05, 2018
The Top 5 Downsides and Dangers of Cryptocurrency Mining
More details
February 22, 2018
Reducing the Risk of Phishing Attacks
More details
July 11, 2017
How Changing Malware is Changing Security
More details
May 18, 2017
Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
More details

Industry Surveys

September 20, 2018
IT Security: 2018 Benchmarking Survey
More details
July 26, 2018
IT Security in the UK & Ireland: 2018 Business Survey
More details
September 14, 2017
IT Security at SMBs: 2017 Benchmarking Survey
More details
March 15, 2017
IT Security in the UK: 2017 Business Survey
More details

Take the first step towards better security for your company

Email Security Gap Analysis report

Cyren examined 2.7 million inbound emails at companies using various email security solutions to measure any possible "security gaps" in their protection – download the aggregated report.

Web Security Diagnostic

Identify security gaps now with Cyren's free online web security test. In less than 30 seconds, you will know if you may be vulnerable to cyber threats – from malware to phishing attacks to botnets.

Test your web security

Recent blog posts

Emotet: From a Banking Trojan to One of the Most Advanced Botnets

by Tinna Thuridur Sigurdardottir and Sarah Neubauer

Email Security Malware Threat Analysis

In 2014, the Emotet malware started as a banking Trojan targeting European bank customers. Back then, nobody expected this malware would evolve into …

Ransomware Overshadowed by Phishing, But It's Not Dead Yet

by John Callon

Industry Insights Malware Ransomware

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a …

Buying Email and Web Security Has Gotten Harder

by Duncan Mills

Email Security Web Security

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email and web security? New Buyer’s Guides give a …

How to Protect Your Office 365 Email Users from Phishing

by John Callon

Email Security Phishing

Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In cased you missed it, in 2018 …

Christmas Eve Warning! Malware Targeting Amazon Shoppers

by Maharlito Aquino and Kervin Alintanahin

Security Research & Analysis Threat Analysis

Shopping for Christmas gifts has never been easier, especially with Amazon—and who doesn’t use Amazon? This is why using fake Amazon orders is a …

Office 365 Top Brand Targeted by Phishing Kits in 2018

by Magni Sigurdsson, Sarah Neubauer

Phishing Security Research & Analysis

As 2018 comes to a close, Cyren security researchers wanted to contribute to the customary year-end wrap-ups by sharing: The 20 Most Targeted Brands …