Tessian Blog
Subscribe to our blog
Industry insights, straight to your inbox every week
- All Categories
- ...
-
Email DLP
Introducing Tessian Architect: The Industry’s Only Intelligent Data Loss Prevention Policy Engine
-
Integrated Cloud Email Security
New Technology Integration: Sumo Logic Tessian App
-
Email DLP, Integrated Cloud Email Security, Insider Risks, Compliance
You Sent an Email to the Wrong Person. Now What?
-
Engineering Blog
A Solution to HTTP 502 Errors with AWS ALB
-
Life at Tessian
Tessian Officially Named a 2021 UK’s Best Workplace™ in Tech
-
Email DLP, Customer Stories
Customer Story: How Tessian Helped a Private Equity Firm Achieve Threat Visibility Through A Platform Approach
-
Email DLP, Advanced Email Threats
New ESG Report Highlights Gaps in M365 Native Security Tools
-
Advanced Email Threats
We Analyzed 2 Million Malicious Emails. Here’s What We Learned.
-
Life at Tessian
200 Reasons to Love Tessian
-
Email DLP, Customer Stories
Customer Story: How Tessian Combines Data Loss Prevention With Education in Financial Services
-
Advanced Email Threats
What is a Software Supply Chain Attack?
-
Advanced Email Threats
What Does a Spear Phishing Email Look Like?
-
Email DLP
How to Close Critical Data Loss Prevention (DLP) Gaps in Microsoft 365
-
Integrated Cloud Email Security, Email DLP
Legacy Data Loss Prevention vs. Human Layer Security
-
Integrated Cloud Email Security, Advanced Email Threats
Legacy Phishing Prevention Solutions vs. Human Layer Security
-
Email DLP, Advanced Email Threats, Compliance
5 Cyber Risks In Manufacturing Supply Chains
-
Compliance
NIST Cybersecurity Framework and Email Security
-
Integrated Cloud Email Security
Tessian Partners with Optiv Security and Moves to a 100% Channel Model
-
Advanced Email Threats
Phishing vs Spear Phishing: Phishing and Spear Phishing Examples
-
Email DLP, Integrated Cloud Email Security
What is Email DLP? Overview of DLP on Email