A perspective on next generation cybersecurity, compliance risks and the cloud

May 10, 2016

How to Manage Security Alert Fatigue, Threat Response Best Practices

Duane Kuroda

According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.

May 09, 2016

FBI Issues Another Ransomware Warning, CryptXXX 2.006 Bypasses Free Decryption

Ryan Kalember, senior vice president of Cybersecurity Strategy

New types of ransomware continue to emerge, and cybercriminals show no signs of slowing down. We recently discovered four new ransomware variants, including CryptXXX, which is strongly linked to both a sophisticated threat actor and to Angler, the world’s biggest exploit kit by volume.

May 03, 2016

Second Harvest Food Bank Recognizes Proofpoint with Blue Diamond Award

Sharyl Givens, vice president of Human Resources, Proofpoint

More than 500 Proofpoint employees work and live in Silicon Valley—and we are dedicated to helping our community year-round.

April 18, 2016

The Latest Business Email Compromise (BEC) Targets, Topics and Tactics: Impostor Email

Mark Guntrip

Impostor emails continue to hit a wide range of businesses around the world, and they don’t show any signs of slowing. According to reports, one unidentified U.S. company lost nearly $100 Million as a result.

April 07, 2016

Zero-Day Adobe Flash Vulnerability Discovered, Recommended Next Steps

Kevin Epstein, VP, Proofpoint Threat Operations Center

Proofpoint security researchers recently discovered a new exploit in the Magnitude exploit kit, and working with fellow researchers in the security community, determined that it targeted a previously unrep

March 22, 2016

Instagram Attack Spotlights Blended Social Media and Email Trend

Mike Lee

Instagram continues to increase in popularity and unfortunately cyber criminals have caught on. A recent Instagram attack has highlighted an important phenomenon—the blending of social media and email attacks.

March 09, 2016

Cyber Criminals Scoring With Impostor Emails

Ryan Kalember

The Latest Trend Or Natural Evolution?

February 25, 2016

Three Things to See During RSA Conference 2016: Human Exploits and Russian Attackers

Ryan Kalember

Next week is the annual RSA Conference, and the cybersecurity community will be coming together to discuss how we can keep organizations safe from the latest cyber crime efforts.

February 18, 2016

New Ransomware Discovered: Three Ways to Prevent It, How to Report It

Ryan Kalember

This week we uncovered a new form of ransomware malware (Locky), which infects organizations and holds data hostage until a ransom is paid.

February 10, 2016

Mobile Apps Unchecked: Why Federal Agencies Need to Go Beyond App Store Security

Dave Jevans

Federal cybersecurity teams are under intense scrutiny as public sector breaches dominate headlines. Unfortunately, another critical threat is looming.