TECH DIGITAL RESOURCE LIBRARY

Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.

Our Website: https://cofense.com/


Latest Content From Cofense

E-Book: Left of Breach

by CofenseFeb 01, 2019

Want to Avoid Attacks? Think Like the Marines. The Marines are tough, but they're smart too. That's why they anticipate risks to stay "left of bang" on the battlefield and reduce their losses. Download this Cofense e-book and learn to use similar thinking to strengthen your phishing defense and keep your company "left of breach."


Whitepaper: When it Comes to Phishing, Healthcare is Hurting

by CofenseFeb 01, 2019

In this industry brief, Cofense shares exclusive data on phishing in the healthcare industry. The take-away: healthcare lags behind other frequently attacked industries in recognizing and reporting phishing emails.


E-Book: 19 Minutes: A Minute-by-Minute Account of Collective Defense in Action

by CofenseFeb 01, 2019

Employees received an email appearing to come from their CEO that bypassed all their other technology. See how this company analyzed, responded to, and resolved the attack - in less than 20 minutes.


E-Book: 6 Keys to Faster Phishing Mitigation

by CofenseFeb 01, 2019

Phishing is still the #1 cyber-attack vector. Don't take a chance on missing malicious emails and the resulting breaches. Download the e-book for 6 keys to faster phishing mitigation!


Whitepaper: If It Ain’t Broke, Don’t Fix It: Cofense Malware Review

by CofenseFeb 01, 2019

What malware types were resurgent in the past two quarters? Find out in the Cofense Malware Review Q2-Q3 2018. Get a big-picture look at the most popular malware, new delivery mechanisms, evolving phishing lures, and more. Learn why Hermes and AZORult spiked, plus get insight on how threat actors are tweaking weapons that work. View the report now.


Webcast: The Real Impact of a Data Security Breach

by CofenseOct 03, 2018

A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, and how an effective data breach response program can help mitigate the damage.


Infographic: Data Breaches and the Great Security Disconnect

by CofenseApr 30, 2018

The growing sophistication and fast-evolving nature of cyberthreats have made data breach preparedness a critical issue for enterprises. View our interactive infographic to learn the surprising statistics and how you can adjust. Three cyberthreats have quickly emerged as major new data breach threats that leave organizations vulnerable and exposed to substantial damage: Phishing, Malware and Ransomware.


Whitepaper: Cofense Malware Review: A Look Back and Look Forward

by CofenseApr 30, 2018

A Look Back at 2017 and a Look Ahead. Like any threat, malware evolves. Last year saw WannaCry, NotPetya, and Shamoon (again)&emdash;and those were just the malware threats that commanded global headlines. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence on how the malware is steadily changing.


E-Book: Five Phishing Predictions

by CofenseApr 30, 2018

Buckle up, folks. We're in for a rough ride.You can't stop what you can't see. To give you visibility into the changing phishing landscape, we surveyed Cofense experts to predict what's coming next in phishing predictions and trends.


Whitepaper: Phishing Response Trends: It’s a Cluster

by CofenseApr 30, 2018

Phishing is the #1 Threat, but Most Companies Are Unprepared. With the number of phishing attacks at 1,220,523, a 65% increase over the previous year, it's no wonder we find ourselves in a war against phishing. And the survival of your business is at stake. So, are organizations winning the war or just holding ground?