ViewPoint

A perspective on next generation cybersecurity, compliance risks and the cloud

April 03, 2017

Webinar: How to Build an Advanced Email Security Strategy

Mark Guntrip

Every day, cybercriminals try to steal data, funds, and confidential information from your company via malicious emails. Ransomware, business email compromise (BEC) and sandbox evasion threats have grown rampant.

March 28, 2017

How to Invest in the Institutional Revolution of Blockchain

Joanna Belbey

We’ve all heard that blockchain will revolutionize business. We nod our heads in agreement, but do we really understand it? In an attempt to uncover the significance of blockchain and opportunities for investing, I spoke with one of its leading voices, Richie Etwaru.

March 22, 2017

New Proofpoint Research Reveals a 45% Surge in Business Email Compromise Attacks—and Increased Domain Spoofing

Robert Holmes

Business email compromise (BEC), or impostor email is one of the biggest cyber threats facing organizations today. And to stay at the forefront of today’s threat landscape, Proofpoint recently conducted extensive research into attack attempts across more than 5,000 enterprise customers between Ju

March 17, 2017

The Sweet Spot between ‘Compliant’ and ‘Secure’

Adenike Cosgrove

Proofpoint recently joined a group of security leaders at the World Cybersecurity Congress in London, UK. The main topic of conversation? Regulation.

March 15, 2017

Social Engineering Breathes New Life Into Exploit Kits, Web-Based Attacks

Sherrod DeGrippo

Declines in exploit kit (EK) activity over the course of 2016 have been well-documented, dropping overall by roughly 94% since a January 2016 high (Figure 1).

February 24, 2017

A Survey of the 2016 Threat Landscape Infographic

Proofpoint Staff

The cybercrime landscape evolved significantly in 2016.

February 20, 2017

Proofpoint Wins Two 2017 SC Awards: Best Email Security Solution and Best Regulatory Compliance Solution

Proofpoint Staff

We are proud to announce Proofpoint has secured two 2017 SC Awards for Best Email Security Solution and Best Regulatory Compliance Solution. These distinctions are especially poignant as two panels of judges voted on hundreds of competitors.

February 13, 2017

Why the Email Gateway is Not Enough to Stop BEC Attacks

Mark Guntrip

Business email compromise (BEC) attacks are rampant. It’s incredibly easy and lucrative for attackers to spoof trusted brands. These threats look just like normal business email and cannot be detected using sandbox technologies.

February 10, 2017

Mobile Devices: What Could Possibly Go Wrong? Lessons from the Frontlines

Dave Jevans

Next week the cybersecurity industry will converge on San Francisco for the annual RSA Conference—and next Tuesday afternoon I’ll be leading a disc

February 09, 2017

Don’t Get Blindsided by Brand Fraud, Stop Digital Risk

Celeste Kinswood

As an enterprise brand, you have more touchpoints to engage with your customers than ever before. From mobile apps and social media to web and email, you can readily share your latest news and start valuable conversations with customers.

Pages