Tessian
On-demand
-
Wednesday, January 22, 2020 · 4:30 PM GMTWith 88% of data breaches caused by human error, is your 2020 security strategy able to withstand the impact of employee errors?
Despite over 3,000 security products in the market, data breaches are at an all-time high and businesses remain at r... -
Wednesday, October 24, 2018 · 11:00 AM BSTEver mistakenly sent an email to the wrong person?
Misaddressed emails were the #1 form of digital data security incident reported to the Information Commissioner’s Office in 2017.
Tessian is a machine intelligent email security platform th... -
Tuesday, July 24, 2018 · 11:00 AM BSTRules are extremely easy to understand; however, when a system gets operationalized, it starts with 100 scenarios and then writes 100 rules to handle them. As time goes by, we encounter more and more exceptions and start making more rules to keep ...
Past
-
Thursday, December 5, 2019 · 5:00 PM GMTWe all know the damage a data breach can trigger; your company name in the headlines, long term reputation damage, regulatory fines and loss of customer trust. But how exactly can all this harm be traced back to simple mistakes that can happen on ...
-
Thursday, November 7, 2019 · 4:00 PM GMTCEO fraud - also known as Business Email Compromise - is one of the most expensive problems in cybersecurity. The scope of money to be lost through email is staggering, accounting for $26bn in worldwide losses according to FBI reports.
Email imp... -
Thursday, October 10, 2019 · 5:00 PM BSTIn our latest research, we found only 22% of employees remember and action the security training they receive. It's clear that traditional training is failing to protect enterprises and it's time to fundamentally change how we tackle the phishing ...
-
Thursday, October 10, 2019 · 4:00 PM BSTDLP is known for its frustrations; the resource inefficiencies, false positives, manual log checking and costly overheads. But these frustrations are part of a darker truth surrounding DLP. Traditional DLP is failing businesses, with blindspots th...
-
Thursday, September 26, 2019 · 3:00 PM BSTDLP is known for its frustrations; the resource inefficiencies, false positives, manual log checking and costly overheads. But these frustrations are part of a darker truth surrounding DLP. Traditional DLP is failing businesses, with blindspots th...
-
Friday, December 28, 2018 · 4:00 PM GMT“95% of successful attacks on Enterprise networks stem from successful spear phishing, and over $12.5bn has been lost to spear phishing since 2013” Chris Mansfield, Head of EMEA Professional Services, Tessian
Data breaches from spear phishing a... -
Thursday, November 8, 2018 · 3:00 PM GMTRules are extremely easy to understand; however, when a system gets operationalized, it starts with 100 scenarios and then writes 100 rules to handle them. As time goes by, we encounter more and more exceptions and start making more rules to keep ...