In spite of extensive regulatory guidance since 2010, some financial services firms are still baffled by how to comply with communications rules and regulations pertaining to social media.
Pharmaceutical companies can use social media to engage and educate patients as well as to provide reliable information about their products.
Community banks and credit unions can use social media to level the playing field with big banks. With a thoughtful, and sometimes, inexpensive social media and digital presence, a smaller bank can resonate with its community and engage with existing and potential customers in their area.
Organizations spend billions of dollars every year to protect themselves from today’s advanced cyber threats. What’s the best way to invest that money?
Ransomware, business email compromise (BEC) and phishing attacks continue to make headlines worldwide. And for all of society’s technological advances, human beings (that is, your employees) remain the weakest link in the cybersecurity ecosystem.
Proofpoint Achieves In-process Status for FedRAMP and Kicks-off Common Criteria Certification Testing to Help Federal Agencies Stop Sophisticated Cyberattacks
Knocking power grids offline, immobilizing intelligence and even upending elections are within the realm of today’s digital attacks.
85% of Organizations Targeted By At Least One Business Email Compromise (BEC) Attack in Q1 2017, Up 10% from Q4 2016
Business email compromise (BEC) threats maliciously spoof trusted relationships – such as executives or business partners – to trick people within an organization into sending money or sensitive information to the attacker. BEC is on the rise and is having a significant impact on its victims.
CRN, a brand of The Channel Company, recently recognized Proofpoint’s Molly Foley, director of Channel and Field Marketing, as part of its prestigious 2017 Women of the Channel list.
Cybercriminals are evolving their strategies to target your people, rather than your infrastructure—and that trend extends to business email compromise (BEC) attacks, which recently incr
I remember sitting in a boardroom on a Monday morning with the CISO of a bio engineering firm along with several members of his security and legal staff. He had recently contacted me requesting incident response (IR) assistance following a call from the FBI.