RESOURCES

Blog

Help yourself to our library of blogs, whitepapers, research reports, and webinars on a range of cybersecurity topics. We regularly update our resource centre with threat intelligence on emerging phishing threats, expert advice on boosting your organization’s IT security, and tips on remaining compliant with data security regulations – plus plenty more.

BLOG

Read our latest expert articles

How phishing gangs weaponize the 24-hour news cycle

Learn how attackers use headlines to supercharge their phishing campaigns.

RSAC 2022 round-up: It’s good to be back!

Find out what surveyed attendees and the Egress team thought of RSAC 2022 in San Francisco.

Sextortion phishing attacks up by 334%

Sextortion attacks are rising – learn the warning signs and how to advise targeted users. 

Cybercriminals are exploiting cryptocurrency donations to the Ukraine crisis

Learn how people are being tricked into send crypto donations straight into the wallets of criminals

Blog

Cybersecurity predictions

Four cybersecurity predictions for 2022

Find out which cybersecurity trends our leadership team expect to dominate CISO's thoughts during 2022. 

Cybersecurity 2022 budget priorities

Get the lowdown on the latest industry reports, plus five expert recommendations on how to shape your priorities.

Top 5 Cybersecurity Predictions for 2021

After a year that transformed the way we live and work, it’s time to look ahead to what 2021 might bring.

2020 Vision: Egress leaders look ahead to the New Year

As the year draws to a close, it’s tempting to reflect on the major developments that helped shape 2019. But in the technology industry—and most of all, the cybersecurity industry—we look to the future, not the past.

S Empowerteam (1)
Egress Solutions

Protect against data breaches by reducing human activated risk

Learn more

Even though phishing attacks aren’t new, the problem keeps getting worse. Detecting and stopping phishing more effectively requires a combination of more intelligent techniques.

Learn more

Many successful breaches start with an unintentional error by a trusted user. But roadblocks aren’t the answer. Empower users to work more securely.

Learn more

Some of the most devastating data breaches originate with malicious insiders. Detect and mitigate these threats without adding unnecessary friction for legitimate users.

Learn more

Ransomware has reached a crisis level across industries and geographies. Mitigating human activated risk is one of the most powerful steps you can take to protect your organization.

Learn more

Moving email to the cloud unlocks access to a wide range of integrated security capabilities. Make the most of your investment and eliminate critical gaps.

Learn more

Third-party security solutions may still play an important role once you move email to the cloud. But it’s critical to eliminate protection gaps and avoid unnecessary complexity.

Learn more

Auditing every business in your supply chain to ensure their security policies and controls meet your standards is extremely difficult, and there will always be a weak link.

Learn more