A perspective on next generation cybersecurity, compliance risks and the cloud

September 21, 2015

Proofpoint Joins AirWatch Mobile Security Alliance to Stop Malicious Mobile Apps

Dave Jevans

News hit yesterday that malicious mobile applications are sneaking into legitimate app stores at an increasing rate—and for organizations, this threat is only the ti

September 10, 2015

Malicious Fantasy Football Mobile Apps That May Steal Your Data

Proofpoint Staff

When the defending Super Bowl™ champions New England Patriots take on the storied Pittsburgh Steelers tonight to kick-off the NFL regular season, millions of sports fans will also be celebrating the start of a new fantasy football season—with many accessing their results via mobile devices and fa

September 03, 2015

3 Tips to Boost Your Personal Cybersecurity While Traveling

Proofpoint Staff

If you are like most people, you’re excited about the upcoming 3-day weekend. For some, it’s the last chance to enjoy the fun of summer. Hackers are excited too, because higher volumes of travelers offer more opportunities to exploit human and system flaws with malicious attacks.

August 27, 2015

Cybersecurity Terms Among the Latest Dictionary Entries


With the onslaught of cybersecurity threats, breaches, and espionage, new words are constantly being created to describe these acts and technologies.

August 17, 2015

Eliminate The Zero-Day Exploit Vulnerability On Your Jeep. We Know Someone Who Did!

We tracked down one of the 1.4 million Fiat Chrysler car owners who was affected by the recall due to the Jeep Cherokee Hacking Incident. We didn’t have to go far to find a Jeep Cherokee owner affected by the zero-day exploit on the Harman Uconnect Infotainment system.

August 10, 2015

3 Tips Every Brand Should Know To Make Their Social Media Presences More Secure


Social media is a communication channel imperative for most enterprise businesses today.

August 05, 2015

The Cybercrime Economics of Malicious Macros [Infographic]

Proofpoint Staff

Document email attachments bearing malicious macros have become popular again as a weapon of choice among cyber security attackers threatening organizations across industries including finance, government, healthcare, and education.

August 03, 2015

3 Tips to Boost Your Personal Cybersecurity

Proofpoint Staff

Most advanced attacks rely on exploiting human and system flaws. Following these 3 tips can boost your personal cybersecurity.

July 20, 2015

Lessons Learned from OPM: Prioritize Your Activities, Focus on Your Crown Jewels

Ryan Kalember

We’ve all read about the cyberattack on the Office of Personnel Management (OPM). The records of 22.1 million people were compromised in what is now considered the worst cyberattack in U.S. history.

June 16, 2015

How Long Should I Keep This Data?

Robert Cruz

We are increasingly being asked this question from organizations – companies looking for best practice to preserve information that has value, along with enforceable practices to get rid of that which does not.