Industry frameworks play a critical role in helping teams assess cybersecurity controls against known adversarial tactics and best practices. Launched in 2024, The Insider Threat Matrix™ is an open, public framework purpose-built to address insider threats.
On this episode of DISCARDED, Selena Larson welcomes back guest and part-time co-host Tim Kromphardt. Freshly back from DEFCON,Tim explores the world of request-for-quote (RFQ) fraud—a growing scam targeting small- to medium-sized businesses with fake purchase requests and net financing schemes.
Security works best when technical teams and human risk teams work together. SOC operators, threat analysts, and other technical professionals play a critical role in turning threat intelligence into practical guidance that helps employees stay safe.
Cyber threats are no longer confined to email. From multi-channel attack chains to exploitation of AI assistants, today’s threat landscape is more complex than ever. Adding to this complexity is the emergence of agentic AI – autonomous AI capable of making decisions.
To regain control over their expanding risk surface, agencies are adopting data security posture management (DSPM): a modern framework for continuously identifying where sensitive data lives, who has access and how their data may be exposed. It’s a proactive response to the chaos.
Stop threats where they start—your people This October, make the most of Cybersecurity Awareness Month with our free Cybersecurity Awareness Kit. It’s designed to help your users understand how security can be simple—and how small actions can make a big difference.
Proofpoint Data Security is an industry first, combining data loss prevention (DLP), data security posture management (DSPM), and insider threat management (ITM) in a single, unified solution. Our data security solution:
On this episode of DISCARDED, host Selena Larson and Proofpoint Principal Research Engineer Jason Ford dive into two resurging email attack techniques—Microsoft 365 Direc
Download the Proofpoint 2024 Voice of the CISO report. Find insights, trends, and learn how cybersecurity leaders are managing in the current threat landscape.
In this new executive whitepaper, Proofpoint explores the strategic implications of the NIST Cybersecurity Framework (CSF) 2.0, which elevates cybersecurity from a technical concern to a business-critical, board-level priority.
Cyberattackers target people. They exploit people. Ultimately, they are people. That’s why the Human Factor report focuses on how technology and psychology combine to make people so susceptible to modern cyber threats.
As the cyber threat landscape continues to evolve, so does the role of the CISO.