Hero Banner - Corporate Blog

Blog

Perspectives on next generation cybersecurity, compliance risks and the cloud

June 05, 2018

Twitter Password Leak Shines a Light on Corporate Social Account Protection

Roman Tobe

On May 3rd, Twitter asked its 336 million users to change their passwords due to an internal bug. The company discovered stored passwords unmasked in an internal log.

May 22, 2018

Proofpoint Customers: Get Early Access to Our Nexus Threat Explorer

Tony Paterra

Proofpoint is excited to announce early access to Proofpoint Nexus Threat Explorer. Nexus Threat Explorer (NTX) gives customers direct access to the vast corpus of threat intelligence in Proofpoint’s 800B+ node threat graph.

May 21, 2018

How Machine Learning Can Revolutionize Your Document Review Process

Ankur Sharma, Senior Product Manager, Proofpoint Enterprise Archive

The Problem with Manual Document Review

May 16, 2018

Why Did Email Fraud Attacks Grow 103% Year-Over-Year?

Ryan Terry

Email fraud rose to new levels in 2017 and in the first quarter of 2018 and we continue to see an increase in both the size and scope of the problem. These socially engineered attacks, which target people rather than technology, are leveraging

May 15, 2018

Three Key Findings from Our 2018 Healthcare Report

Ryan Witt

The healthcare industry is under attack. Ransomware is shutting down emergency rooms, fraudulent emails are defrauding patients, and attackers steal confidential medical data regularly.

April 20, 2018

Security Awareness and Lifting the Abuse Mailbox Burden

Duane Kuroda

Security awareness training helps organizations improve their security posture. Part of that training is enabling the next step after a user recognizes a phishing email—sending the suspicious email to an abuse mailbox. But what happens to an email forwarded to the abuse mailbox?

April 19, 2018

Proofpoint Digital Risk Introduces Executive and Location Threat Monitoring

Roman Tobe

A company’s executives and offices are focal points for unhappy customers, activist groups, cybercriminals, and disgruntled employees who want to do harm. These risks to your executives and locations are difficult to manage without visibility.

April 18, 2018

Proofpoint Cloud App Security Broker Empowers Organizations to Protect User-Centric Attacks

Catherine Hwang

Enterprise cloud adoption shifts the cybersecurity landscape for both attackers and the organizations they target. As data moves to the cloud cyber threats move with it, evolving their targets and priorities.

April 17, 2018

Email Fraud: Why one of the World’s Oldest Email Threats Continues to Be Very Successful

Ryan Terry

Why is email fraud—one of the oldest and most commonly known scams, where a fraudster spoofs a trusted identity in an effort to steal money or valuable information—still so pervasive today? You have likely heard of one of these email tricks that seem too unrealistic to be true and thought to your

Pages