Industry Insights

Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

3 Key Takeaways from the 2023 Gartner® Market Guide for Email Security

As email continues to be the primary vector for cyber attacks, staying up to date with the latest developments in email security is essential. In this blog post, we examine key insights from the latest Market Guide for Email Security Report by Gartner, and offer practical recommendations on how security and risk management leaders can fortify their security posture in 2023.

Zendesk – Is It a One Way “Ticket” to Ransomland?

In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform.

Why Traditional Security Solutions aren’t Stopping Ransomware

75% of companies that were hit by ransomware last year had up to date endpoint protection solutions in place. Why didn’t that help stop the attacks? Let’s take a look at the most common approaches to ransomware prevention, and why they haven’t been able to provide a solution for enterprises.

Designing Zero Trust Endpoints

Zero Trust is becoming a standard approach to securing access to enterprise applications (both cloud and on-prem). With Zero Trust, access is granted based primarily on user authentication and risk level, and not on the user’s presence in the corporate network. Based on the user’s credentials, the enterprise can grant access to a subset of enterprise resources and employees can work from any network without relying on a VPN connection. The architecture is called “Zero Trust” because the enterprise shouldn’t automatically trust endpoints within the corporate perimeter. Instead, it should verify all users and endpoints.
email security report

Is VDI Cost Effective vs Win10 Laptops?

VDI involves hosting virtual desktops on centralized server and storage infrastructure. In this blog post we discuss the cost effectiveness of VDI versus Windows 10, and what factors need to be accounted for when choosing between VDI and DaaS (Desktop-as-a-Service).


Ready to Try
Perception Point?