Resource Center

The latest content focusing on how to reduce risk and strengthen your cyber posture.

ornament

Guides & Ebooks

Blog

Cyber Risk Quantification vs. Cyber Risk Optimization May 30, 2023

Cyber Risk Quantification vs. Cyber Risk Optimization

Learn about the difference between cyber risk quantification and cyber risk optimization, and why both are essential for a robust cybersecurity program.

What We Can Learn from the City of Dallas Ransomware Attack May 22, 2023

What We Can Learn from the City of Dallas Ransomware Attack

How CYE Optimizes Your Cybersecurity Budget May 9, 2023

How CYE Optimizes Your Cybersecurity Budget

What CISOs Can Gain from Cyber Risk Quantification April 30, 2023

What CISOs Can Gain from Cyber Risk Quantification

What You Need to Know About the Anonymous Sudan Hacker Group April 4, 2023

What You Need to Know About the Anonymous Sudan Hacker Group

Success Stories

Webinars

The Cybersecurity Maturity Report 2023: The Stories Behind the Data play-icon
Webinar

The Cybersecurity Maturity Report 2023: The Stories Behind the Data

Watch two security experts tell the story behind the Cybersecurity Maturity Report and discuss the state of cybersecurity in 2023. 

How CISOs Can Navigate the Changing Landscape of Cybersecurity play-icon
Webinar

How CISOs Can Navigate the Changing Landscape of Cybersecurity

In this webinar, our expert panel of CISOs shares insights on how organizations can adapt to the changing role of CISOs and build a strong cyber posture.

Ring in the New Year with Strategic IT/OT Security play-icon
Webinar | CYE, OTORIO

Ring in the New Year with Strategic IT/OT Security

With devastating cyberattacks likely to occur in 2023, it’s crucial to learn how to establish secure IT and OT networks to protect your organization. Watch this expert panel to learn how.

400 critical vulnerabilities detected: which will attackers exploit? play-icon
Webinar | CYE, Fierce Healthcare

400 critical vulnerabilities detected: which will attackers exploit?

Healthcare security breaches are increasing at an alarming rate. How can healthcare IT and infosec teams protect their organizations? Watch this webinar to learn how to identify critical cyber gaps.

What you need to know to protect your business play-icon
Panel | Findings, CYE, CyberHive, Praxonomy, Sapphire, LSEG

What you need to know to protect your business

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

Cyber Talks

Women's Day Special play-icon
Daniel Gal, Shani Peled and Michal Goldshtein

Women's Day Special

Our panel of highly skilled women discuss the challenges posed by an excess of security measures, the benefits of a purple team approach, and offer unique insights from their own experiences as women.

Eps. 7 | 19 Min

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nafthali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min

Efficient Techniques for Quantifying Risk  play-icon
Inbar Ries and Nimrod Partush

Efficient Techniques for Quantifying Risk

Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.

Eps. 5 | 21 Min