THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Industry Insights

Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

What is EAC?

EAC, short for Email Account Compromise, is a type of cybersecurity attack in which cyber attackers attempt to fully compromise a user’s email account and…

What is Cyber Threat Intelligence?

Cyber Threat Intelligence (CTI) is, in essence, data that has been analyzed and validated through multiple analysis processes specific to cybersecurity.

Characteristics of Best Email Security Solutions

As a CISO or security leader, you are probably asking yourself, what are the characteristics of the top-notch email security solutions in the market? What should you look for, when evaluating an email security solution?
Default Email Security

SEGs vs. ICES Solutions: The Complete Guide

Find out everything there is to know about Gartner’s two email security solution categories, SEGs (Secured Email Gateways) and ICES (Integrated Cloud Email Security), including their benefits, differences, and how each is deployed.
email symbols connected by lines

The (Yet) Unsolved Problem of Email Security

The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.

TALK TO SALES

Ready to Try
Perception Point?