ViewPoint

A perspective on next generation cybersecurity, compliance risks and the cloud

July 29, 2016

7 Nightmares Keeping Chief Compliance Officers Awake At Night

Joanna Belbey

This article originally appeared in Forbes

July 28, 2016

Malvertising Innovation Brings New Risks To Millions

Proofpoint Staff

Observers might be tempted to conclude that the abrupt drop in exploit kit activity in June means a diminished threat from drive-by malvertising attacks.

July 25, 2016

Scammers Exploit Turkey Coup Attempt with Timely Business Email Compromise (BEC) Lures

Mark Guntrip

It’s nothing new that attackers and scammers use popular events and national or regional crisis situations as lures to get victims to fall for their schemes. Tactics range from obtaining money as a fake charity, credential phishing or even malware downloads if victims click on the URL.

July 14, 2016

Go For Gold: 8 Ways to Secure Your Corporate Social Engagement for the Rio 2016 Olympics

Celeste Kinswood

The Rio 2016 Summer Olympic Games are right around the corner. From the lighting of the torch to the closing ceremonies, excited fans will be engaging on social media from August 5 to August 21.

June 28, 2016

Business Email Compromise Attacks Increase, $3.1B in Exposed Losses: FBI Warning

Mark Guntrip

On June 14, the FBI once again increased its estimate of exposed losses caused by business email compromise (BEC) attacks to $3.1B worldw

June 22, 2016

Don’t Let Angler Phishing Lure Your Customers into a Trap

Celeste Kinswood

Fraudsters create fake social media accounts for many reasons. They may want to use your brand’s popularity to distribute malware, ads, pornography, or hate speech. Alternatively, they might want to protest or embarrass your brand.

June 08, 2016

Proofpoint Nexus Advances Threat Detection, Extraction and Correlation with Three New Partnerships

Ryan Kalember

Staying ahead of cybercriminals requires two key elements: best-of-breed technology and intelligence that keeps pace with the threat landscape. Proofpoint is committed to helping our customers protect their employees, the information they create, and their brands.

June 02, 2016

Why Today’s Financial Firms Need Next-Generation Supervision

Emily Wojcik

Financial services firms face some the world’s most stringent and complex regulatory pressures. Now they face another challenge: controlling soaring compliance costs.

May 27, 2016

Business Email Compromise (BEC) Claims Another C-Level Job

Mark Guntrip

The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.

May 10, 2016

How to Manage Security Alert Fatigue, Threat Response Best Practices

Duane Kuroda

According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.

Pages