- 17 September 2015
CSO magazine interviews Proofpoint about the phishing campaign targeting the Russian military.
- 18 September 2015
SC Magazine UK covers Proofpoint's research on the attacks targeting the Russian military.
- 09 September 2015
The Street interviews Proofpoint CEO, Gary Steele about strong demand for cybersecurity solutions.
- Wednesday, August 5, 2015
CRN Q&A with Proofpoint CEO Gary Steele about the changing security landscape and the opportunities it presents.
- Tuesday, July 14, 2015
Compliance Week covers Proofpoint Nexgate's report on the current state of social media and compliance risks.
- 06 March 2015
Join us on March 6 at 9AM PST/12PM EST for this live webcast sponsored by The Knowledge Group.
- Wednesday, September 9, 2015
scaragan - 21 May 2015
Changes in success tracking enable Dridex threat actors to assess not only technical efficacy, but also demonstrate ROI for their malware innovations.
Proofpoint Staff - 27 January 2015
April 15 is still months away, but phishers are already filing their campaigns in hopes of an early return.
Proofpoint Staff - 22 January 2015
Information security often focuses on the "cool" exploit and detection side of cyber-defense, but the importance of incident response is gaining attention.
- Friday, January 23, 2015
Detect, block, and respond to email and social media-based threats, and harden against data loss
Comply easily and thoroughly with internal security controls as well as external regulatory policies
Find information quickly—whether it resides on email, IM, social media, shared drives or SharePoint
Threat Insight Blog
Research and commentary on malware, user actions, and other threats to information security
Posted by Darien Huss and Matthew Mesa | 0
Posted by Proofpoint Staff | 0
Within the last week, the now infamous “man-in-the-browser” (MITB) banking malware Dyreza appears to have significantly expanded its target set of entities from which to steal credentials.
JOIN US FOR A LIVE DEMO
Learn how our leading Archive solution can help your organization keep information safe and compliant.
Learn how our advanced threat protection solutions can keep your organization protected from spam, phishing, and other advanced threats.
Learn about our solutions for incident response and threat intelligence and see how your organization can minimize the damage of an attack.