All Topics
All
All Languages
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=GKWOhWb_ 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=GKWOhWb_ 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR" width="600" height="185" alt="Proofpoint Data Security Posture Management." typeof="foaf:Image" /> </picture>)
À quoi sert un programme de gestion des menaces internes ?
Fri, May 9, 2025 9:10 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=AwVxwwE6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=AwVxwwE6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7-" width="600" height="185" alt="Connect city" typeof="foaf:Image" /> </picture>)
Les cyberattaques par email ont entraîné des pertes record en 2024
Thu, May 1, 2025 8:27 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=iP2rpiZm 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=iP2rpiZm 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl" width="600" height="185" alt="converging" typeof="foaf:Image" /> </picture>)
Le triple jeu de Proofpoint : leadership sur le marché, innovation et choix du client dans le domaine de la sécurité des données
Wed, April 30, 2025 2:42 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC" width="600" height="185" alt="Connect light" typeof="foaf:Image" /> </picture>)
Expansion de la surface d’attaque – Bloquer la prise de contrôle de comptes le plus rapidement possible est un impératif
Wed, April 30, 2025 9:57 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=3rqaPojC 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=cppQbEsa 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=cppQbEsa 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=3rqaPojC 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=cppQbEsa 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/resource-banners/pfpt-hfr25-resource-banner.png.webp?itok=cppQbEsa" width="600" height="185" alt="The Human Factor 2025" typeof="foaf:Image" /> </picture>)
Proofpoint publie le premier volume d’une nouvelle série de rapports « Le facteur humain », consacré à l’ingénierie sociale
Tue, April 29, 2025 8:51 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=AwVxwwE6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=AwVxwwE6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7- 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-city.jpg.webp?itok=PzcIQH7-" width="600" height="185" alt="Connect city" typeof="foaf:Image" /> </picture>)
Les innovations Proofpoint qui simplifient vos opérations
Mon, April 28, 2025 5:28 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=VHyF30gC 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=hCjDGzls 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=hCjDGzls 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=VHyF30gC 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=hCjDGzls 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connected-cubes.jpg.webp?itok=hCjDGzls" width="600" height="185" alt="Connected cubes" typeof="foaf:Image" /> </picture>)
Parce qu’on ne bloque pas les compromissions des données avec du bricolage : pourquoi une solution de sécurité des données unifiée s’impose
Mon, April 28, 2025 2:25 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=ZfZ5P_Yj 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=2iZmERyK 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=2iZmERyK 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=ZfZ5P_Yj 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=2iZmERyK 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-1.jpg.webp?itok=2iZmERyK" width="600" height="185" alt="Cloud Security" typeof="foaf:Image" /> </picture>)
Les innovations Proofpoint qui renforcent vos défenses
Mon, April 28, 2025 11:43 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=eftP_QaD 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=KdHXu4zh 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=KdHXu4zh 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=eftP_QaD 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=KdHXu4zh 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-696585118-min.jpg.webp?itok=KdHXu4zh" width="600" height="185" alt="Identity Threat Defense" typeof="foaf:Image" /> </picture>)
Pour protéger ses actifs et sa réputation, une banque américaine préfère Proofpoint à Abnormal
Thu, April 24, 2025 12:02 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=JpJ2YtYS 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=PS5-aMbV 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=PS5-aMbV 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=JpJ2YtYS 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=PS5-aMbV 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-598261008-min.jpg.webp?itok=PS5-aMbV" width="600" height="185" alt="Proofpoint Data Security Posture Management." typeof="foaf:Image" /> </picture>)
Expansion de la surface d’attaque – Pourquoi la sensibilisation à la cybersécurité doit évoluer pour renforcer la résilience humaine
Wed, April 23, 2025 8:23 AM UTC (UTC +00:00)
Watch Now