Resource Center

The latest content focusing on how to reduce risk and strengthen your cyber posture.

ornament

Guides

Blog

Cyber Risk Assessment: What It Is and Why It’s Necessary March 22, 2023

Cyber Risk Assessment: What It Is and Why It’s Necessary

An in-depth guide to cyber risk assessment that will help you understand how, why, and when to perform a CRA, and how to find a cyber risk assessment provider.

Why SVB’s Closure Means More Security Risks for Its Customers March 16, 2023

Why SVB’s Closure Means More Security Risks for Its Customers

Meet a Customer Success Manager at CYE March 6, 2023

Meet a Customer Success Manager at CYE

3 Ways Red Team Services Help Protect Your Business’s Cyber Assets February 27, 2023

3 Ways Red Team Services Help Protect Your Business’s Cyber Assets

Key Takeaways from Recent Airport Cybersecurity Incidents February 22, 2023

Key Takeaways from Recent Airport Cybersecurity Incidents

Success Stories

Webinars

Ring in the New Year with Strategic IT/OT Security play-icon
Webinar | CYE, OTORIO

Ring in the New Year with Strategic IT/OT Security

With devastating cyberattacks likely to occur in 2023, it’s crucial to learn how to establish secure IT and OT networks to protect your organization. Watch this expert panel to learn how.

400 critical vulnerabilities detected: which will attackers exploit? play-icon
Webinar | CYE, Fierce Healthcare

400 critical vulnerabilities detected: which will attackers exploit?

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

What you need to know to protect your business play-icon
Panel | Findings, CYE, CyberHive, Praxonomy, Sapphire, LSEG

What you need to know to protect your business

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

Making Security Decisions Based on Data
Product Demo

Making Security Decisions Based on Data

How to reduce your exposure, mitigate attacks, and ensure optimal use of cybersecurity resources.

Application Security in Hyper-Growth Companies
Panel | Wolt, CYE, Tinder, Snappy

Application Security in Hyper-Growth Companies

Security leaders from some of the fastest-growing app-led companies share their experience in keeping apps safe from the exponential rise of cyber risks.

Cyber Talks

Women's Day Special play-icon
Daniel Gal, Shani Peled and Michal Goldshtein

Women's Day Special

Our panel of highly skilled women discuss the challenges posed by an excess of security measures, the benefits of a purple team approach, and offer unique insights from their own experiences as women.

Eps. 7 | 19 Min

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nafthali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min

Efficient Techniques for Quantifying Risk  play-icon
Inbar Ries and Nimrod Partush

Efficient Techniques for Quantifying Risk

Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.

Eps. 5 | 21 Min