The Federal Trade Commission’s (FTC) new ban on non-compete clauses, coming in September 2024, allows employees to work freely but complicates the handling of patient data.
Hello to all our cyber squirrels! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Dr. Bob Hausmann, Proofpoint's Manager of Learning Architecture and Assessments and a seasoned psychologist.
Attacks using generative AI, QR codes, and even telephone assisted (TOAD) techniques are now in the toolset of everyday bad actors. This shift is fueling increased volumes of high-scale, high personalization email attacks globally.
Behavioral AI is a critical new functionality to help security teams stop email exfiltration of sensitive data.
All data is not created equal. So, as you plan your transition to a new archive platform, you’ll have to factor in what to migrate and what to retain in the legacy platform, particularly what’s on legal hold.
Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint.
Microsoft’s native and add-on email security capabilities help to protect against basic threats, but they aren’t enough to ensure full protection.
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities.
Threat actors use sophisticated techniques to target the federal government with ransomware attacks, impostor emails, phishing attacks, and other exploits.
As Generative AI tools continue to evolve, both cyber criminals and your employees are using them in ways that can pose risks to your organization.
Over the last year, as large-scale data breaches continued to dominate headlines, advancements in generative AI morphed into a double-edged sword for both adversaries and defenders. During that time, threat actors adapted their craft with blinding speed.
As the threat landscape evolves, one thing remains constant, humans are the primary target for attackers. Successful defenders design their cybersecurity systems to consider the needs, behaviors, and limitations of humans through a multi-layered approach to threat defense.