Resource Center

The latest content focusing on how to reduce risk and strengthen your cyber posture.

ornament

Guides & Ebooks

Blog

Cybersecurity Predictions: What We Can Expect in 2024 November 30, 2023

Cybersecurity Predictions: What We Can Expect in 2024

What sorts of cyber threats will organizations confront in 2024? Read this blog to learn what CYE experts said that security teams should expect.

Cognitive Risk in the Boardroom: The Hidden Cyber Challenge November 16, 2023

Cognitive Risk in the Boardroom: The Hidden Cyber Challenge

The Israel-Hamas War’s Impact on the Cyber Threat Landscape November 1, 2023

The Israel-Hamas War’s Impact on the Cyber Threat Landscape

The Top Cyber Threats Facing Consumers and Businesses Today October 15, 2023

The Top Cyber Threats Facing Consumers and Businesses Today

How NIST and the SEC Align CISOs with the Board—and How CRQ Helps October 3, 2023

How NIST and the SEC Align CISOs with the Board—and How CRQ Helps

Case Studies

Webinars

The Impact of Evolving Cybersecurity Compliance on Businesses

The Impact of Evolving Cybersecurity Compliance on Businesses

Explore the latest requirements introduced by regulatory bodies like CISA, the FTC, and the SEC and what it means for your business.

Navigating the Cybersecurity Threat Landscape and New Regulations

Navigating the Cybersecurity Threat Landscape and New Regulations

Explore the evolving cyber landscape, learn about CYE's Hyver platform for cyber risk quantification, and master effective threat tracking, compliance, and risk communication strategies through this On Demand Webinar.

LinkedIn Live: Basics of Offensive Security

LinkedIn Live: Basics of Offensive Security

Join us for an exclusive workshop with industry expert Phillip Wylie as he unravels the intricacies of Offensive Security.

Cyber Risk Quantification: New Buzzword or a Real Game Changer?

Cyber Risk Quantification: New Buzzword or a Real Game Changer?

In this webinar, an expert panel of security leaders discusses how cyber risk quantification helps clarify and communicate the true risks that businesses face.

The Cybersecurity Maturity Report 2023: The Stories Behind the Data

The Cybersecurity Maturity Report 2023: The Stories Behind the Data

Watch two security experts tell the story behind the Cybersecurity Maturity Report and discuss the state of cybersecurity in 2023. 

Cyber Talks

A Look into Common BUT Rare Vulnerabilities Found play-icon
Kenny On and Chen Levy

A Look into Common BUT Rare Vulnerabilities Found

Join our experts as they dive into Recon and information harvesting techniques, MFA issues, and divulge stories from their very own experiences.

Eps. 8 | 23 Min

Women's Day Special play-icon
Daniel Gal, Shani Peled and Michal Goldshtein

Women's Day Special

Our panel of highly skilled women discuss the challenges posed by an excess of security measures, the benefits of a purple team approach, and offer unique insights from their own experiences as women.

Eps. 7 | 19 Min

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nafthali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min