At a recent financial services event, leading cyber security experts explored how employees using social media can enable a cyber-attack at your firm.
Every day, cyber criminals send malicious emails targeting your organization in an attempt to steal data, funds, and other confidential information.
Every day, cybercriminals try to steal data, funds, and confidential information from your company via malicious emails. Ransomware, business email compromise (BEC) and sandbox evasion threats have grown rampant.
We’ve all heard that blockchain will revolutionize business. We nod our heads in agreement, but do we really understand it? In an attempt to uncover the significance of blockchain and opportunities for investing, I spoke with one of its leading voices, Richie Etwaru.
New Proofpoint Research Reveals a 45% Surge in Business Email Compromise Attacks—and Increased Domain Spoofing
Business email compromise (BEC), or impostor email is one of the biggest cyber threats facing organizations today. And to stay at the forefront of today’s threat landscape, Proofpoint recently conducted extensive research into attack attempts across more than 5,000 enterprise customers between Ju
Proofpoint recently joined a group of security leaders at the World Cybersecurity Congress in London, UK. The main topic of conversation? Regulation.
Declines in exploit kit (EK) activity over the course of 2016 have been well-documented, dropping overall by roughly 94% since a January 2016 high (Figure 1).
The cybercrime landscape evolved significantly in 2016.
Proofpoint Wins Two 2017 SC Awards: Best Email Security Solution and Best Regulatory Compliance Solution
We are proud to announce Proofpoint has secured two 2017 SC Awards for Best Email Security Solution and Best Regulatory Compliance Solution. These distinctions are especially poignant as two panels of judges voted on hundreds of competitors.
Business email compromise (BEC) attacks are rampant. It’s incredibly easy and lucrative for attackers to spoof trusted brands. These threats look just like normal business email and cannot be detected using sandbox technologies.