THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Industry Insights

Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

email symbols connected by lines

The (Yet) Unsolved Problem of Email Security

The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.

Virtual Event: How did the bad guys get in? Attack vectors in the modern enterprise

Have you ever wondered how you were hacked? In this meetup, Perception Point will discuss the latest attack vectors that cybercriminals are employing to breach organizations. We will cover various techniques used through the email channel, cloud collaboration channels including Box, Dropbox, OneDrive, and Google Drive and perimeter breaches - diving into the attack kill chains.
Security Awareness Training

Employee Security Training
Proven Not Enough

Train the machine—not just the employee. Hackers know that many companies rely on security employee training alone, so they’ve been upping their game to trick…
Default Email Security

Default Email Security Not Secure Enough

The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients have expressed dissatisfaction with default email security solutions, specifically citing Office 365.
Email security

Securing Beats at Scale

In this post, we detail how we overcame the issue that “Beats” are not optimized for managing authentication at scale.

User Experience vs. Cyber Security

There's a tension between security and business enablement. There's also a tension between security and user experience. So what can you do about it? A full article on the dos and don't's on user experience in cybersecurity

Securing Teams

Perception Point was chosen to protect all content shared by the 100,000+ employees of a Fortune 500 enterprise through MS Teams. Read this case study to see how.

TALK TO SALES

Ready to Try
Perception Point?