A perspective on next generation cybersecurity, compliance risks and the cloud

June 28, 2016

Business Email Compromise Attacks Increase, $3.1B in Exposed Losses: FBI Warning

Mark Guntrip

On June 14, the FBI once again increased its estimate of exposed losses caused by business email compromise (BEC) attacks to $3.1B worldw

June 22, 2016

Don’t Let Angler Phishing Lure Your Customers into a Trap

Celeste Kinswood

Fraudsters create fake social media accounts for many reasons. They may want to use your brand’s popularity to distribute malware, ads, pornography, or hate speech. Alternatively, they might want to protest or embarrass your brand.

June 08, 2016

Proofpoint Nexus Advances Threat Detection, Extraction and Correlation with Three New Partnerships

Ryan Kalember

Staying ahead of cybercriminals requires two key elements: best-of-breed technology and intelligence that keeps pace with the threat landscape. Proofpoint is committed to helping our customers protect their employees, the information they create, and their brands.

June 02, 2016

Why Today’s Financial Firms Need Next-Generation Supervision

Emily Wojcik

Financial services firms face some the world’s most stringent and complex regulatory pressures. Now they face another challenge: controlling soaring compliance costs.

May 27, 2016

Business Email Compromise (BEC) Claims Another C-Level Job

Mark Guntrip

The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.

May 10, 2016

How to Manage Security Alert Fatigue, Threat Response Best Practices

Duane Kuroda

According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.

May 09, 2016

FBI Issues Another Ransomware Warning, CryptXXX 2.006 Bypasses Free Decryption

Ryan Kalember, senior vice president of Cybersecurity Strategy

New types of ransomware continue to emerge, and cybercriminals show no signs of slowing down. We recently discovered four new ransomware variants, including CryptXXX, which is strongly linked to both a sophisticated threat actor and to Angler, the world’s biggest exploit kit by volume.

May 03, 2016

Second Harvest Food Bank Recognizes Proofpoint with Blue Diamond Award

Sharyl Givens, vice president of Human Resources, Proofpoint

More than 500 Proofpoint employees work and live in Silicon Valley—and we are dedicated to helping our community year-round.

April 18, 2016

The Latest Business Email Compromise (BEC) Targets, Topics and Tactics: Impostor Email

Mark Guntrip

Impostor emails continue to hit a wide range of businesses around the world, and they don’t show any signs of slowing. According to reports, one unidentified U.S. company lost nearly $100 Million as a result.

April 07, 2016

Zero-Day Adobe Flash Vulnerability Discovered, Recommended Next Steps

Kevin Epstein, VP, Proofpoint Threat Operations Center

Proofpoint security researchers recently discovered a new exploit in the Magnitude exploit kit, and working with fellow researchers in the security community, determined that it targeted a previously unrep