ViewPoint

A perspective on next generation cybersecurity, compliance risks and the cloud

January 20, 2017

FedRAMP Authorization for Proofpoint Enterprise Archive Solution

Darren Lee

While the industry consistently sees archive deployments outpace on-premises deployments almost 9:1[1], there has been a lag to cloud adoption within the federal government.

January 19, 2017

Eight Cybersecurity Predictions and Recommendations for 2017

Ryan Kalember

Our Proofpoint Threat Operations Center recently published its 2017 security predictions. In that report, we explained what we think the cyber threat landscape will look like in 2017 and how it might differ from previous years.

December 28, 2016

What is DMARC?

Mark Guntrip

The DMARC (Domain-based Message Authentication Reporting and Conformance) standard is one of your company’s best defenses against today’s advanced email threats including business email compromise (BEC) and consumer phishing.

December 22, 2016

What is DKIM?

Mark Guntrip

Implementing email authentication technology is one of the best ways to protect your employees and customers from targeted email attacks.

December 12, 2016

The Social CEO: Executives Are Using Social Media To Transform Firms

Joanna Belbey

A newly released study shows that Social CEOs can enhance the reputation of their firms, attract talent and increase sales.

December 09, 2016

Proofpoint Named a Leader in the Gartner Magic Quadrant for Enterprise Information Archiving, 5 Years Running

Darren Lee

Developing a modern enterprise archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements.  Legal and compliance teams struggle with how to best retain, access, discover and ultimately dispose of content in compliance with evolving regulations.

December 07, 2016

What is Sender Policy Framework (SPF)?

Mark Guntrip

Many organizations have invested in email fraud education for employees and consumers.

December 02, 2016

Three Misconceptions about Business Email Compromise (BEC) Attacks, Debunked

Adenike Cosgrove

Highly-targeted, low volume business email compromise (BEC) scams are one of the biggest threats to companies today.

November 22, 2016

Is Social Media and “Employee Advocacy” Possible Within Regulated Industries?

Joanna Belbey

Regulated industries such as healthcare and financial services have stringent requirements about how they communicate with the public. How does this square with the concept of “employee advocacy”, where firms encourage their employees to share news of their firm on social media?

November 15, 2016

Three Goals of the UK's New Cyber Security Strategy

Robert Holmes

Recently, Dr. Ian Levy, director of the UK’s new National Cyber Security Centre (NCSC) provided a preview of key initiatives included in the government’s new cyber security strategy.

Pages