ViewPoint

A perspective on next generation cybersecurity, compliance risks and the cloud

April 29, 2015

Under Attack? Respond now, but respond wisely

Duane Kuroda

When cyber criminals strike, they go out of their way to hide actions, misdirect investigators, and even evade detection tools. Often, security teams start the incident response process in the dark, with little more than source and destination IPs, a category, and a proposed severity.

April 01, 2015

Accelerating the Move to Microsoft Office 365

Joe Diamond

IT needs to address security gaps in the platform before getting buy-in from interested parties

March 24, 2015

Information Management Chaos in Financial Services

Robert Cruz

Walking through downtown Palo Alto for lunch last week I noticed something a bit strange. Restaurants and cafes were strangely quiet. VCs, techies, and students were all focused on the big screens. Not watching a Cardinal game or talk show or The Price is Right.

March 18, 2015

Are You Prepared for a Data Breach?

Joe Diamond

Data breaches garnered a lot of media attention in 2014, and so far that momentum has carried forward into 2015.

March 16, 2015

Nexgate Social Threat Center, a 360-degree actionable view of social media threats

Proofpoint Staff

We recently announced the Nexgate Social Threat Center, a real-time social media security operations console.

March 16, 2015

US State Department Highlights Failure in Employee-Driven Email Retention

Robert Cruz

In other poorly timed news, the US State Department’s Office of Inspector General (OIG) released a report this week detailing the agency’s poor email management practices and general State of Departmental Confusion regarding business

March 12, 2015

Microsoft Office 365: Regulatory Compliance Need Not Be a Challenge

Joe Diamond

Microsoft Office 365 is compliant with a number of important global standards and regulations, ranging from European Union data protection laws to the Health Insurance Portability and Accountability Act and ISO 27001.

March 05, 2015

Harden Your Cyber Security with Real Risk Assessment Data

Proofpoint Staff

“The Hacker Way is an approach to building that involves continuous improvement and iteration. Hackers believe that something can always be better, and that nothing is ever complete.”–Mark Zuckerberg

March 04, 2015

Security Analytics Pitfalls: Customization vs. Off-the-Shelf

Duane Kuroda

Security analytics can be a valuable source of innovation, but before results can be realized, there are key commitments and costs to consider.

Pages