On a new episode of DISCARDED, Selena Larson and guest host Sarah Sabotka join Saher Naaman, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines.
A recent breach of Smarsh TeleMessage — a modified Signal clone used by U.S. government officials — has exposed sensitive archived messages and contact data from multiple organizations.
This buyer’s guide highlights the most important capabilities for a modern email security solution.
Today’s biggest cyber threats don’t target systems—they target people.
Legacy data protection strategies were built for a different era—one where data rarely left the network, cloud apps didn’t dominate workflows, and insider threats were more exception than expectation.
Communication in today’s digital workspace extends far beyond email. Employees use Microsoft Teams, Slack, cloud applications, social media, and file-sharing platforms to stay connected and productive. But cybercriminals are following — and exploiting — these very same platforms.
On this DISCARDED episode, our threat research sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation.
Phishing, malware, ransomware, business email compromise (BEC) and social engineering are all still popular ways for cybercriminals to target people. But today’s cybercriminals no longer limit their attacks to inboxes.
The nature of cyber risk has changed. Cybercriminals don’t just target systems—they target people. As users move fluidly between email, collaboration tools and cloud applications, the old security model—one built around static perimeters and one-size-fits-all controls—can no longer keep up.
Choosing best-in-class security tools remains important. But today’s CISO must also focus on building an intelligent, cohesive architecture that evolves with the threat landscape and ensures that tools work together to deliver the right defense outcomes.
Proofpoint Prime streamlines security operations by minimizing triage-worthy alerts with industry-leading 99.99% detection accuracy. It reduces labor costs and mitigates the impact of threats through automated workflows and threat response capabilities—saving organizations an average of $390k in operational costs.
In this short demo, you will learn about the new features and capabilities of Proofpoint Prime Threat Protection that protect people wherever they work and stop emerging threats and risks.