RESOURCES
Check out our library of e-Books, Whitepapers, Infographics and more.
This report explores a sharp surge in evasive phishing attacks that include .htm files and abusing Microsoft's Entra B2B collaboration system to bypass Microsoft 365 and other 3rd party vendors.
Read MoreA strategic brief for risk leaders. Human trust is a critical vulnerability that's being exploited with clean, targeted, emails generated by AI. They don't rely on malwar, they rely on belief.
Read MoreWe explore a resurgence of compromised Dropbox-hosted PDF phishing and malware campaigns.
Read MoreThe next frontier of evasion, QR code-based phishing attacks (Quishing) is rapidly emerging as a preferred tactic with cybercriminals.
Read MoreA new generation of phishing campaigns is exploiting large-language-model (LLM) tooling and automated brand-cloning services to create convincingly authentic emails, webpages and entire multi-step user journeys in minutes.
Read MoreA conversation with Silk Logistics Holdings, CISO, Daniel de Jager, talking cybersecurity and defending your organisation against attackers.
DOWNLOAD NOWIn this guide, we explore the global reach and usage of email, break down technical jargon, identify common threats, and offer practical tips to safeguard your people, data, and business.
DOWNLOAD NOWDownload the scorecard to see how much faster MailGuard identifies and blocks advanced, malicious zero-day threats.
DOWNLOAD NOW
To celebrate the 20th Cybersecurity Awareness Month, we asked our team of industry experts for their tips to put together our list of the ‘Top 20 Cybersecurity Non-negotiables’.
Read MoreYour Guide to Staying Cyber Safe & Secure This Holiday Season
DOWNLOAD NOW10 simple steps to keep your people, data and systems safe.
DOWNLOAD NOWLearn some of the most common scams, as well as tips on how you can protect your business.
DOWNLOAD NOWDiscover how to build cyber resilience in a remote or hybrid workforce.
DOWNLOAD NOWLearn how to enhance your organisation's cyber defences to mitigate future threats.
DOWNLOAD NOWRead five cyber lessons and trends that emerged from ransomware attacks in 2020.
DOWNLOAD NOWYour Guide to Staying Cyber Safe & Secure This Holiday Season
DOWNLOAD NOWDiscover the three threats seeking to trick email users during the end of financial year period.
DOWNLOAD NOWRead about cyber mishaps from those that learned the hard way.
DOWNLOAD NOWEverything you need to know about Threat-based impersonation scams.
DOWNLOAD NOWLearn how to prevent theft and the misuse of your company data.
DOWNLOAD NOWWe've put together critical facts on cybercrime to help inform your cyber resilience plan.
DOWNLOAD NOWA brief summary with everything you need to know of IAP's recommendations.
DOWNLOAD NOWHow scam-savvy are you? Test your ability to decipher a scam email from the real thing.
TAKE THE QUIZSix red flags to look out for the next time a suspicious email lands in your inbox.
DOWNLOAD NOWLearn sophisticated mind games fraudsters play in scams to exploit human emotions & errors.
DOWNLOAD NOWMicrosoft CEO, Satya Nadella, on why no-one is immune to cybercrime.
DOWNLOAD NOWRead what Microsoft’s CEO has to say about protecting your business from cybercrime.
DOWNLOAD NOW