Resources
Discovery, analysis and cybersecurity intelligence.
Quarterly State of Phishing Threat Index – Q3 2024
A look at the quarterly Threat Index Report, providing a comprehensive overview of the evolving threat landscape.
The Tolly Test Report 2024
SlashNext had the best detection rate (99%), best overall BEC detection rate (100%), and best overall QR code detection (100%).
The State of Phishing 2024
A mid-year look at the latest phishing trends that are sweeping the globe and what is required to stop them.
Mobile BYOD Security Report
Mobile BYOD Security Report Reveals 71% of Employees Have Sensitive Work Information on their Personal Devices; 43% Were the Target of Phishing Attacks
SlashNext Cloud Email + Microsoft 365 = Complete Email Protection
See how SlashNext AI augments Microsoft 365 to stop zero-hour BEC attacks and advanced phishing threats.
ESG Report: Prolific Adoption of Multi-channel Communication and Collaboration Tools Leaves Organ...
Multi-vector, socially engineered attacks are commonplace, with more than half of organizations reporting that they experience this type of attack weekly.
Cloud Email Security Risk Assessment Sample Report
This custom report is designed to identify linked-based attacks, text-based BEC attacks, and malicious attachments missed by your current email security.
Defending Against Zero-Hour Phishing Threats with AI Phishing Defense
Threat actors are going after the human attack surface with new kinds of phishing and social engineering techniques, tactics, and procedures.
AI Leads the Trend in Technologies to Fill the Cybersecurity Skills Shortage
As the shortage of skilled cybersecurity professionals intersects with the change and sophistication of the threat landscape, AI and ML will be leveraged to fill the gaps, …
Phishing in the Dark—Dangerous Threats on the Web
Organizations are drowning in a sea of increasing sophisticated cyber threats and cyber anglers are using a greater variety of phishing tactics to lure and hook their prey.
Security is a Human Problem
Insights on the evolving phishing landscape and what’s needed to protect your organization.
New Methods for Solving Phishing, BEC, Account Takeovers and Other Security Threats
There is no longer a defensible perimeter that can protect corporate data, so new approaches are needed. Osterman Research conducted an in-depth survey of security pros to …
Experience SlashNext Protection in Action
Request a free trial to see how SlashNext detects zero-hour threats in real-time and stop the attacks that impact your business.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.