A perspective on next generation cybersecurity, compliance risks and the cloud

August 23, 2017

FINRA And Social Media: What to Expect From New Guidance

Joanna Belbey

In spite of extensive regulatory guidance since 2010, some financial services firms are still baffled by how to comply with communications rules and regulations pertaining to social media.

August 16, 2017

Big Pharma and Social Media: How to Avoid Trouble with the FDA

Joanna Belbey

Pharmaceutical companies can use social media to engage and educate patients as well as to provide reliable information about their products.

August 01, 2017

5 Steps For Banks To Avoid Problems With Regulators When Using Social Media

Joanna Belbey

Community banks and credit unions can use social media to level the playing field with big banks. With a thoughtful, and sometimes, inexpensive social media and digital presence, a smaller bank can resonate with its community and engage with existing and potential customers in their area.

July 18, 2017

How Proofpoint Delivers on Gartner's Secure Email Gateway Recommendations

Mark Guntrip

Organizations spend billions of dollars every year to protect themselves from today’s advanced cyber threats. What’s the best way to invest that money?

July 06, 2017

How to Avoid Falling Prey to the Human Factor

Patrick Wheeler

Ransomware, business email compromise (BEC) and phishing attacks continue to make headlines worldwide. And for all of society’s technological advances, human beings (that is, your employees) remain the weakest link in the cybersecurity ecosystem.

June 19, 2017

Proofpoint Achieves In-process Status for FedRAMP and Kicks-off Common Criteria Certification Testing to Help Federal Agencies Stop Sophisticated Cyberattacks

Tony D’Angelo

Knocking power grids offline, immobilizing intelligence and even upending elections are within the realm of today’s digital attacks.

June 14, 2017

85% of Organizations Targeted By At Least One Business Email Compromise (BEC) Attack in Q1 2017, Up 10% from Q4 2016

Ryan Terry

Business email compromise (BEC) threats maliciously spoof trusted relationships – such as executives or business partners – to trick people within an organization into sending money or sensitive information to the attacker.  BEC is on the rise and is having a significant impact on its victims.

June 01, 2017

Molly Foley Named to CRN’s 2017 Women of the Channel

Proofpoint Staff

CRN, a brand of The Channel Company, recently recognized Proofpoint’s Molly Foley, director of Channel and Field Marketing, as part of its prestigious 2017 Women of the Channel list.

May 31, 2017

Watch Out: Four Fake Business Email Compromise (BEC) Personalities Hitting Organizations

Ryan Terry

Cybercriminals are evolving their strategies to target your people, rather than your infrastructure—and that trend extends to business email compromise (BEC) attacks, which recently incr

May 25, 2017

How to Increase Effectiveness with Security Automation

Joe Yun

I remember sitting in a boardroom on a Monday morning with the CISO of a bio engineering firm along with several members of his security and legal staff. He had recently contacted me requesting incident response (IR) assistance following a call from the FBI.