How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

Click below to access the webinar

Watch Now

Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.