All Topics
All
English
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=GYUecO7e 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=QSrSadwU 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=QSrSadwU 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=GYUecO7e 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=QSrSadwU 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-fiberoptics.jpg.webp?itok=QSrSadwU" width="600" height="185" alt="Fiber optics" typeof="foaf:Image" /> </picture>)
Using Multimodel Endpoints for Scalable User Behavior Profiling and Anomaly Detection with Sagemaker
Tue, May 20, 2025 8:40 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=giJf3i_f 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=f6Xy0zMX 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=f6Xy0zMX 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=giJf3i_f 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=f6Xy0zMX 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-op-blog-hero-security-online-day2021_03_1400x540.png.webp?itok=f6Xy0zMX" width="600" height="185" alt="arrows and shield" title="arrows and shield" typeof="foaf:Image" /> </picture>)
Cybersecurity Stop of the Month: Stopping Phishing Attacks that Pivot from Email to SMS
Fri, May 16, 2025 2:56 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=lAxHTgJ6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=g3c0nbBZ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=g3c0nbBZ 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=lAxHTgJ6 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=g3c0nbBZ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-nyc-clouds.jpg.webp?itok=g3c0nbBZ" width="600" height="185" alt="Nyc clouds" typeof="foaf:Image" /> </picture>)
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=BOfXKIej 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=Y3RnVegf 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=Y3RnVegf 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=BOfXKIej 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=Y3RnVegf 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-cs-blog-banner-4.jpg.webp?itok=Y3RnVegf" width="600" height="185" alt="Cloud Security" typeof="foaf:Image" /> </picture>)
Welcoming Hornetsecurity to Proofpoint: A Bold Step Toward a More Secure, AI-Driven Future
Thu, May 15, 2025 1:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=JArssBuj 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=WIjhzuH3 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=WIjhzuH3 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=JArssBuj 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=WIjhzuH3 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-threat-actor-hood.jpg.webp?itok=WIjhzuH3" width="600" height="185" alt="Threat actor hood" typeof="foaf:Image" /> </picture>)
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=GKWOhWb_ 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=GKWOhWb_ 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1493692333-min.jpg.webp?itok=v-sdcMgR" width="600" height="185" alt="Proofpoint Data Security Posture Management." typeof="foaf:Image" /> </picture>)
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=M2e24LZ9 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=HbcwCgsJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=HbcwCgsJ 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=M2e24LZ9 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=HbcwCgsJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-lures.jpg.webp?itok=HbcwCgsJ" width="600" height="185" alt="lures" typeof="foaf:Image" /> </picture>)
CoGUI Phish Kit Targets Japan with Millions of Messages
Tue, May 6, 2025 5:46 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=7qavhn6h 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=CaPlWMlJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=CaPlWMlJ 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=7qavhn6h 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=CaPlWMlJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-gv-blog-banner-5.jpg.webp?itok=CaPlWMlJ" width="600" height="185" alt="Government" typeof="foaf:Image" /> </picture>)
Email Attacks Drive Record Cybercrime Losses in 2024
Thu, May 1, 2025 8:27 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=iP2rpiZm 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=iP2rpiZm 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-converging.jpg.webp?itok=CCVmxQwl" width="600" height="185" alt="converging" typeof="foaf:Image" /> </picture>)
Proofpoint’s Triple Play: Market Leadership, Innovation and Customer Choice in Data Security
Wed, April 30, 2025 2:42 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC" width="600" height="185" alt="Connect light" typeof="foaf:Image" /> </picture>)
The Expanding Attack Surface: Stopping Account Takeovers at Your Front Door Is Critical
Wed, April 30, 2025 9:57 AM UTC (UTC +00:00)
Watch Now