While the industry consistently sees archive deployments outpace on-premises deployments almost 9:1, there has been a lag to cloud adoption within the federal government.
Our Proofpoint Threat Operations Center recently published its 2017 security predictions. In that report, we explained what we think the cyber threat landscape will look like in 2017 and how it might differ from previous years.
What Is DKIM?
A newly released study shows that Social CEOs can enhance the reputation of their firms, attract talent and increase sales.
Proofpoint Named a Leader in the Gartner Magic Quadrant for Enterprise Information Archiving, 5 Years Running
Developing a modern enterprise archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements. Legal and compliance teams struggle with how to best retain, access, discover and ultimately dispose of content in compliance with evolving regulations.
Many organizations have invested in email fraud education for employees and consumers.
Highly-targeted, low volume business email compromise (BEC) scams are one of the biggest threats to companies today.
Regulated industries such as healthcare and financial services have stringent requirements about how they communicate with the public. How does this square with the concept of “employee advocacy”, where firms encourage their employees to share news of their firm on social media?
Recently, Dr. Ian Levy, director of the UK’s new National Cyber Security Centre (NCSC) provided a preview of key initiatives included in the government’s new cyber security strategy.