A perspective on next generation cybersecurity, compliance risks and the cloud

August 10, 2015

3 Tips Every Brand Should Know To Make Their Social Media Presences More Secure


Social media is a communication channel imperative for most enterprise businesses today.

August 05, 2015

The Cybercrime Economics of Malicious Macros [Infographic]

Proofpoint Staff

Document email attachments bearing malicious macros have become popular again as a weapon of choice among cyber security attackers threatening organizations across industries including finance, government, healthcare, and education.

August 03, 2015

3 Tips to Boost Your Personal Cybersecurity

Proofpoint Staff

Most advanced attacks rely on exploiting human and system flaws. Following these 3 tips can boost your personal cybersecurity.

July 20, 2015

Lessons Learned from OPM: Prioritize Your Activities, Focus on Your Crown Jewels

Ryan Kalember

We’ve all read about the cyberattack on the Office of Personnel Management (OPM). The records of 22.1 million people were compromised in what is now considered the worst cyberattack in U.S. history.

June 16, 2015

How Long Should I Keep This Data?

Robert Cruz

We are increasingly being asked this question from organizations – companies looking for best practice to preserve information that has value, along with enforceable practices to get rid of that which does not.

May 20, 2015

Defining Excellent Customer Service

Dennis Reno

The 2015 SC Magazine Awards announced Proofpoint as the winner of the Customer Service Excellence in IT Security companies.

May 12, 2015

Social Media Compliance in the Fortune 100

As marketing teams find success building corporate social media programs– they are unintentionally creating risks for their peers in the Compliance department.  The average Fortune 100 has over 320 branded social accounts with over 200,000 followers and 1500 employee participants.  The firm is re

April 29, 2015

Under Attack? Respond now, but respond wisely

Duane Kuroda

When cyber criminals strike, they go out of their way to hide actions, misdirect investigators, and even evade detection tools. Often, security teams start the incident response process in the dark, with little more than source and destination IPs, a category, and a proposed severity.

April 01, 2015

Accelerating the Move to Microsoft Office 365

Joe Diamond

IT needs to address security gaps in the platform before getting buy-in from interested parties