Organizations rely on the cloud to quickly and efficiently deploy the latest technology to stay competitive—and Proofpoint is committed to helping security teams keep pace.
It’s safe to say e-discovery is a problem that is not going away. It impacts every organization of every size and every vertical.
News hit yesterday that malicious mobile applications are sneaking into legitimate app stores at an increasing rate—and for organizations, this threat is only the ti
When the defending Super Bowl™ champions New England Patriots take on the storied Pittsburgh Steelers tonight to kick-off the NFL regular season, millions of sports fans will also be celebrating the start of a new fantasy football season—with many accessing their results via mobile devices and fa
If you are like most people, you’re excited about the upcoming 3-day weekend. For some, it’s the last chance to enjoy the fun of summer. Hackers are excited too, because higher volumes of travelers offer more opportunities to exploit human and system flaws with malicious attacks.
With the onslaught of cybersecurity threats, breaches, and espionage, new words are constantly being created to describe these acts and technologies.
We tracked down one of the 1.4 million Fiat Chrysler car owners who was affected by the recall due to the Jeep Cherokee Hacking Incident. We didn’t have to go far to find a Jeep Cherokee owner affected by the zero-day exploit on the Harman Uconnect Infotainment system.
Social media is a communication channel imperative for most enterprise businesses today.
Document email attachments bearing malicious macros have become popular again as a weapon of choice among cyber security attackers threatening organizations across industries including finance, government, healthcare, and education.
Most advanced attacks rely on exploiting human and system flaws. Following these 3 tips can boost your personal cybersecurity.