Select Page

Cyren Resources Center

On-demand Webinars

Security Practices

The Hidden Costs Beyond The Inbox

Recorded June 01, 2022

Watch this podcast-style event where Michael Sampson and Mike Fleck comment on the cardinal points in the recent 2022 Osterman Research report.

Watch Now

The Hidden Costs of Phishing & BEC

Recorded April 05, 2022

Attend this podcast-style event to learn how Fluid Networks dramatically reduced the time their analysts spend managing the problem of phishing, BEC, and user education.

Watch Now

Better Together! Cyren + KnowBe4 Provide A Comprehensive Solution To Phishing and BEC

Recorded March 08, 2022

Attend this joint webinar by Cyren and KnowBe4 to learn how their integrated solution ensures organizations get the most value from user training, advanced threat detection, and automated incident response to improve defense against phishing and BEC threats.

Watch Now

Use Security Maturity to Gain Strategic Ground Against Phishing

Recorded April 05, 2022

CISO have to switch from board-level communication to detailed technical architectures and monitoring of organization-wide processes. The ability to show value and gaps to the board yields the CISO’s budget, while command of organizational details ensures the necessary controls are in place and properly maintained to keep risks at acceptable levels. …

Watch Now

Starting the Path to Zero Trust in Microsoft Cloud

Recorded December 01, 2021

The company network perimeter no longer exists as the security boundary business. With the large adoption of hybrid work and the expectation that even after the COVID-19 pandemic is under control, businesses will not go back to a full in-office work model. In a hybrid work model, the Internet has become the network perimeter.

Watch Now

The roles of users and machines in the fight against phishing

Recorded July 28, 2021

Protecting your organization from phishing, BEC, and ransomware requires four effective pillars: prevention, detection, incident response, and prediction. During this webinar, we will discuss the different technologies required and how to leverage user education to stop phishing attacks, increase user productivity, and avoid alert fatigue.

Watch Now

How to stop Phishing Threats for Office 365

Recorded July 07, 2021

Digital Pathways have been in the Cyber Security market for nearly 25 years and seen a continuous rise in data security breaches. Our suite of products and services enables our clients to monitor their security posture, balance business risk with cyber risk, and achieve a cost-effective way to keep their data safe. …

Watch Now

Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats

Recorded April 28, 2021

Evasive phishing, BEC, and fraud attacks are getting past existing email defenses. The sophistication of these attacks helps them avoid perimeter detection and fool your employees, including those who’ve been through Security Awareness and Training programs.

Watch Now

Significantly reduce security incidents arising from phishing attacks

Recorded May 26, 2021

With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right has never been more important. But why is it, when almost everyone has email security, does this statistic remain largely constant year after year? …

Watch Now

How to remediate Office 365 Phishing Failures

Recorded March 10, 2021

Organizations using Microsoft 365’s email platform consistently report higher rates of successful evasive phishing attacks. And it’s no surprise — even Microsoft’s native Advanced Threat Protection (ATP) and Exchange Online Protection (EOP) have malicious catch rates of 0.15 percent, which is significantly lower than the rate of other solution providers. …

Watch Now

Understanding Threats

How to stop Phishing Threats for Office 365

Recorded November 17, 2021

Watch this on demand panel discussion to address why and how to stop phishing messages making it past traditional Secure Email Gateways and reaching users’ inboxes.

Watch Now

Analysis of phishing kits

Recorded October 06, 2021

A phishing kit includes the web pages and software code used to display mirror images of legitimate services and collect exposed credentials, payment information, and other sensitive data. This webinar is a behind the scenes look at phishing kits.

Watch Now

Quarantined and Exposed: Evolving Threats in a Remote Working World

Recorded May 28, 2020

Attackers have consistently leveraged current world events to their advantage by evolving their attack TTPs to bypass perimeter defenses. Overnight, COVID-19 has caused enterprises to deploy technologies, policies, and resources to enable employees to work remotely. …

Watch Now

Phishing Threats Overview for Legacy Gateways and Microsoft 365

Recorded April 02, 2020

Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesses. From massive-scale, botnet-driven outbreaks to highly focused attacks using business email compromise (BEC), spear phishing, and whaling techniques – every company and employee is at risk of becoming a target.

Watch Now

Malware in 2020: Recent Trends and What Is Coming Next

Recorded February 27, 2020

Malware authors continue to evolve distribution and coding techniques to get their software past your security. In this webinar, Arna Magûsardóttir, Cyren’s lead analyst for Global Threat Detection, will explain key malware trends from 2019 and provide analysis of representative malware techniques, as well as an outline what we might expect to see from malware developers (and what security teams should prepare for) during 2020.

Watch Now

How Evasive Phishing Is Fooling Your Security

Recorded July 25, 2019

Join Cyren threat researcher Tinna Sigurdardottir and industry security product veteran Duncan Mills to learn the top categories of evasive phishing techniques being applied by phishing campaign developers today, and why the use of such techniques is on the upswing.

Watch Now

“Fileless” Ransomware: The Next Big Thing?

Recorded September 20, 2018

Mass ransomware attacks have receded in volume this year, but the rising use of super stealthy “fileless” ransomware, where no malicious executable is ever saved to disk, poses challenges for detection and complicates mitigation.

Watch Now

How Evasive Malware-as-a-Service is Changing Internet Security

Recorded May 24, 2018

Malware authors continue to evolve distribution and coding techniques to get their software past business security. In this webinar, Senior Solutions Engineer Tom McNash will review the rise of the malware service industry on the dark web, which is facilitating new malware attacks and contributing to rising volumes of more sophisticated malware.

Watch Now

Company And Product Information

Threat Engines

Email Security Engine – Anti Virus Datasheet

Download

Email Security Engine – Inbound Anti-Spam Datasheet

Download

Email Security Engine – Outbound Anti-Spam Datasheet

Download

Email Security Engine – Ip Reputation Datasheet

Download

Web Security Engine Datasheet

Download

Malware Detection Engine Datasheet

Download

Inbox Security

Cyren Inbox Security Datasheet

Download

Cyren Incident Response Service (CIRS) Datasheet

Download

Catching the Phish that Got Away

Download

Cyren Inbox Security Casestudies

Download

Threat InDepth

Threat InDepth Overview

Download

Threat InDepth for the Security Executive – Solution Brief

Download

Threat InDepth for the SOC – Solution Brief

Download

Threat InDepth – Phishing and Fraud Datasheet

Download

Threat InDepth – IP Reputation Datasheet

Download

Threat InDepth – Malware File Intelligence

Download

Threat InDepth – Malware URL Intelligence

Download

Reports And White Papers

Cyberthreat Reports

Beyond the Email Perimeter

Download

How a Stolen Phone Can Spawn Phishing Attacks

Download

Phishing:
The Thrill of the Chase!

Download

Phishing:
From Targeted Attacks to Evasive Phishing

Download

Malware:
The Malware Wars are Heating Up

Download

Ransomware:
An In-depth Look at The Ransomware Phenomenon

Download

Botnets:
The Clone Armies of Cyber Crime

Download

White papers

White Paper:
A New Vision for Phishing Defense

Download

White Paper:
The Missing Piece in Your Security Awareness Program

Download

eBook:
Enhance Microsoft Defender with Inbox Detection and Response

Download

Cyren White Paper:
A Playbook for Responding to Phishing Attacks

Download

Cyren and Osterman White Paper:
A Guide to Good Threat Intelligence

Download

Cyren and Osterman White Paper:
A Buyer’s Guide to Actionable Threat Intelligence

Download

White Paper:
Why automation is key to combating enterprise phishing

Download

A New Tool for Defending Microsoft 365: Inbox Detection & Response

Download

How to Block Evasive Phishing Attacks from Microsoft 365 Accounts

Download

Employers Using Microsoft 365 Are Especially Vulnerable to Phishing Attacks During the Pandemic

Download

Solving The Phishing Problem In M365

Download

Why SEGs Can’t Effectively Stop Phishing

Download

Catching the Phish that Got Away

Download

A New Vision for Phishing Defense: Inbox Detection & Response

Download

Annual security surveys

Phishing, BEC, and Ransomware Threats for Microsoft 365 Customers: 2022 Benchmarking Survey

Download

Online Calculator

Online Calculator: The hidden costs of phishing & BEC

Download

Playbooks

How to Investigate Targeted Phishing Incidents

Download

Infographics

Understanding Ransomware

Download

Monthly Newsletters

Cyren Newsletter:
June 2022

Download

Cyren Newsletter:
May 2022

Download

Cyren Newsletter:
October 2021

Download

Cyren Newsletter:
April 2021

Download

Cyren Newsletter:
March 2022

Download

Cyren Newsletter:
August 2021

Download

Cyren Newsletter:
February 2021

Download

Cyren Newsletter:
January 2022

Download

Cyren Newsletter:
June 2021

Download

Videos

Like shooting Phish in a Barrel: 3 Perspectives on Email Protection:
Panel Discussion

Download

RSAC 2020:
Panel Discussion

Download

Digital Transformation Expo Europe:
Panel Discussion

Download

Cybersecurity Threat Detection and Prevention:
Panel Discussion

Download

Microsoft Ignite 2019:
Expert Interview

Download

Email Security
Strategies & Solutions:
Panel Discussion

Download

Microsoft Ignite 2019:
Panel Discussion

Download