Malware, User Actions, and Other Threats to Information Security
Featured Post

Posted: Wednesday, December 17, 2014

Cybersecurity Predictions for 2015

2014 was a year in which information security vaulted into the public eye, driven by a surge in both the number and the visibility of data breaches and compromises. What do the cybersecurity experts at Proofpoint think is in store for 2015?


Share
Proofpoint’s Latest Threat Reports

Read about the latest threats and trends observed by Proofpoint in this month’s Threat Report

Starting out? Get up to speed

Discover the major attack vectors and threat types



The Human Factor Report

The Human Factor Report: Gain new insight into the ways attackers exploit end-users' psychology

The Human Report
Latest News

University data breach compromises Social Security numbers

While following a multi-layered information security strategy can minimize threats to important data, even the best protected systems can be vulnerable.

Read More ›

Targeted threats: Security lessons from retail data breaches

The recent series of data breaches in the retail sector brought information security to the forefront of consumers' consciousness, which in turn put more pressure on businesses to evaluate their cybersecurity ecosystems.

Read More ›

@Threatinsight on Twitter