Special Offer: Get 50% off your first 2 months when you do one of the following
Personalized offer codes will be given in each session
Tessian
On-demand
  • Wednesday, January 22, 2020 · 4:30 PM GMT
    With 88% of data breaches caused by human error, is your 2020 security strategy able to withstand the impact of employee errors?

    Despite over 3,000 security products in the market, data breaches are at an all-time high and businesses remain at r...
  • Blank-2
    Wednesday, October 24, 2018 · 11:00 AM BST
    Ever mistakenly sent an email to the wrong person?

    Misaddressed emails were the #1 form of digital data security incident reported to the Information Commissioner’s Office in 2017.

    Tessian is a machine intelligent email security platform th...
  • Tuesday, July 24, 2018 · 11:00 AM BST
    Rules are extremely easy to understand; however, when a system gets operationalized, it starts with 100 scenarios and then writes 100 rules to handle them. As time goes by, we encounter more and more exceptions and start making more rules to keep ...
  • Thursday, December 5, 2019 · 5:00 PM GMT
    We all know the damage a data breach can trigger; your company name in the headlines, long term reputation damage, regulatory fines and loss of customer trust. But how exactly can all this harm be traced back to simple mistakes that can happen on ...
  • Blank-3
    Thursday, November 7, 2019 · 4:00 PM GMT
    CEO fraud - also known as Business Email Compromise - is one of the most expensive problems in cybersecurity. The scope of money to be lost through email is staggering, accounting for $26bn in worldwide losses according to FBI reports.

    Email imp...
  • Blank-6
    Thursday, October 10, 2019 · 5:00 PM BST
    In our latest research, we found only 22% of employees remember and action the security training they receive. It's clear that traditional training is failing to protect enterprises and it's time to fundamentally change how we tackle the phishing ...
  • Blank-4
    Thursday, October 10, 2019 · 4:00 PM BST
    DLP is known for its frustrations; the resource inefficiencies, false positives, manual log checking and costly overheads. But these frustrations are part of a darker truth surrounding DLP. Traditional DLP is failing businesses, with blindspots th...
  • Blank-4
    Thursday, September 26, 2019 · 3:00 PM BST
    DLP is known for its frustrations; the resource inefficiencies, false positives, manual log checking and costly overheads. But these frustrations are part of a darker truth surrounding DLP. Traditional DLP is failing businesses, with blindspots th...
  • Blank-6
    Friday, December 28, 2018 · 4:00 PM GMT
    “95% of successful attacks on Enterprise networks stem from successful spear phishing, and over $12.5bn has been lost to spear phishing since 2013” Chris Mansfield, Head of EMEA Professional Services, Tessian

    Data breaches from spear phishing a...
  • Blank-5
    Thursday, November 8, 2018 · 3:00 PM GMT
    Rules are extremely easy to understand; however, when a system gets operationalized, it starts with 100 scenarios and then writes 100 rules to handle them. As time goes by, we encounter more and more exceptions and start making more rules to keep ...