RESOURCES

Blog

Help yourself to our library of blogs, whitepapers, research reports, and webinars on a range of cybersecurity topics. We regularly update our resource centre with threat intelligence on emerging phishing threats, expert advice on boosting your organization’s IT security, and tips on remaining compliant with data security regulations – plus plenty more.

BLOG

Read our latest expert articles

Egress named as a representative vendor in the Gartner Market Guide for Data Loss Prevention (DLP)

Industry analyst Gartner recently published their 2022 report on the state of the DLP market. They consider DLP a mature technology but do talk to the emergence of next generation data security tools for insider risk management and cloud use cases.

Can outbound data loss be worse than inbound attacks?

These real-world examples show how outbound data loss can be just as devastating as an inbound attack.

Is deliberate exfiltration or human error the bigger outbound threat?

Learn about the biggest outbound threats to today’s businesses from three cybersecurity experts.

What should a CISO's priorities be for reducing inbound and outbound email risk in M365?

Learn how to prioritize security tasks for inbound and outbound risk and how to approach employee engagement regarding security. 

S Empowerteam (1)
Egress Solutions

Protect against data breaches by reducing human activated risk

Learn more about our solutions

Even though phishing attacks aren’t new, the problem keeps getting worse. Detecting and stopping phishing more effectively requires a combination of more intelligent techniques.

Learn more about stopping phishing attacks

Many successful breaches start with an unintentional error by a trusted user. But roadblocks aren’t the answer. Empower users to work more securely.

Learn more about reducing human error

Some of the most devastating data breaches originate with malicious insiders. Detect and mitigate these threats without adding unnecessary friction for legitimate users.

Learn more about stopping malicious insiders

Ransomware has reached a crisis level across industries and geographies. Mitigating human activated risk is one of the most powerful steps you can take to protect your organization.

Learn more about mitigating your ransomware risk

Moving email to the cloud unlocks access to a wide range of integrated security capabilities. Make the most of your investment and eliminate critical gaps.

Learn more about enhancing your Microsoft 365 protection

Third-party security solutions may still play an important role once you move email to the cloud. But it’s critical to eliminate protection gaps and avoid unnecessary complexity.

Learn more about enhancing your Secure Email Gateway

Auditing every business in your supply chain to ensure their security policies and controls meet your standards is extremely difficult, and there will always be a weak link.

Learn more about stopping supply chain attacks