White paper -arkisto

Uusimmat aiheet:

Behaviour Design Principles for Effective Security Awareness

In this talk, Anna Collard, SVP of Content Strategy, and Evangelist for KnowBe4 will map BJ Fogg's Design Behaviour principles to security awareness and culture programs. In this session, Anna will share: • Insights from Kno...

Katso webinaaritallenne

African Cybersecurity Research Report

KnowBe4 conducted an Africa-wide survey to explore whether or not people living on the continent were prepared for the current cyber threats being seen. The survey sought to unpack the areas of weakness that should be of concer...

Avaa white paper

The Security Culture Report 2022

The 2022 KnowBe4 Security Culture Report is the largest study of its kind, measuring organisations' security cultures and surveying more than 530,000 employees across 2,910 organisations worldwide. The report offers unique ins...

Avaa white paper

2022 Phishing by Industry Benchmarking Report

IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organisation’s attack surface: New-school security aw...

Avaa white paper

Discover B2B-Potential on the digital marketplace

E-commerce is also becoming more and more important in B2B. Online marketplaces in particular offer retailers ideal opportunities to sell their products and services to new customers. In this white paper, you will learn what o...

Avaa white paper

B2B-Potenziale auf dem digitalen Marktplatz ausschöpfen

Ein B2B-Marketplace ist eine digitale Plattform, die Ihr Unternehmen mit anderen Firmen mit Interesse an Ihren Produkten vernetzt und den Prozess für alle Beteiligten optimiert. Das Internet bietet jedoch verschiedenste Option...

Avaa tarkistuslista

How can you find the right marketplace for your business?

B2B marketplaces are digital platforms that connect your business with other companies wanting to buy your products – streamlining the process for all involved. But with so many e-commerce options out there, how can you make su...

Avaa tarkistuslista

Web Application and API Protection Capabilities Checklist

Deploying a web application and API security solution while planning, implementing, or optimizing your information security strategy will provide your organization with the ability to understand your unique risks, target securi...

Avaa infograafi

How to Strengthen Your Defenses Beyond the Perimeter

Ransomware, once simply a nuisance strain of malware used by threat actors to restrict access to files and data through encryption, has morphed into an attack method of epic proportions. While the threat of permanent data loss ...

Avaa e-kirja

Den Spieß umdrehen - Wie die bevorzugten Ziele von Angreifern durch intelligente E-Mail-Meldungen und Behebungsmaßnahmen zu Ihrer besten Verteidigung werden

Die Corona-Pandemie hat zu einer verstärkten Migration zu Remote- und Hybrid-Arbeitsplätzen geführt. Doch schon vorher haben Cyberkriminelle anstelle von Infrastrukturen zunehmend Personen ins Visier genommen. Mehr als je zuvor...

Avaa e-kirja
Tilaa uutiskirjeemme
Tärkeimmät uutiset maksutta sähköpostiisi