The one-year mark for BOD 18-01 is quickly approaching, with about a month to go until the October 16, 2018 compliance deadline.
Focusing on advanced threats and how they work is important. But to build a truly effective security strategy for your organization, you need to understand not only the nature of these threats but also who they target at your organization and how.
We’re excited to announce, thanks to Proofpoint’s recent acquisition of Wombat, the availability of the Closed-Loop Email Analysis and Re
Email is a top vector for cybercriminals to breach your organization.
Email fraud continues to make headlines within the cybersecurity space and continuously reaches unprecedented levels of impact on organizations of all sizes and in all locations. In fact, the FBI recently released a new report
In her compelling TED Talk, Keren Elazari, cybersecurity expert and keynote speaker at our upcoming customer conference Proofpoint Protect, reveals the danger of equating the word “hacker” with “bad guy.”
For many organizations, corporate email is their number one threat vector, as they continue to deal with a seemingly never-ending stream of targeted malicious attachments and URLs.
Each week we host a Threat of the Week webinar featuring a high-level look at interesting threats to help security teams navigate the attack landscape.
According to Verizon, email fraud accounts for more than 90% of enterprise attacks.