NEW GARTNER REPORT — SECURING HYBRID WORK: ADOPTING THE RIGHT WORKSPACE SECURITY STRATEGY!  READ THE REPORT HERE

Research
& Insights.

Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Mac Isn’t Safe.
How Do You Like Them Apples?

Apple's security measures aren't enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers.

What is a Zero Day Attack?

A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.
tree root rca report

CVE-2019-0539 Root Cause Analysis

Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
edge of building cve-2017-0199

CVE-2017-0199 (Still) In The Wild

Learn how Perception Point’s advanced threat detection platform caught an advanced attack (CVE-2017-0199) delivered via a malicious document.

See Perception Point in action!

Fill out the form and get a personalized demo of Perception Point.  We’ll send you a link to book a demo with our sales reps within one (1) business day.