As the threat landscape evolves, one thing remains constant, humans are the primary target for attackers. Successful defenders design their cybersecurity systems to consider the needs, behaviors, and limitations of humans through a multi-layered approach to threat defense.
The threat landscape moves fast. Social engineering techniques such as QR code phishing, generative AI deep fakes, and Business Email Compromise (BEC) are constantly evolving. Most security teams say they use real-world threat intelligence to shape their security awareness program.
In the digital age, data loss prevention is a top concern in cybersecurity as organizations strive to safeguard sensitive information in the hands of careless, compromised and complicit users.
Modern CISOs have faced several challenges in recent years, including adapting to the shift to widespread remote working amid significant employee turnover and dealing with a more complex global environment.
The habits of modern workforces create unique challenges for information security teams – users leverage public generative AI tools, work remotely, and access sensitive data in cloud apps from personal devices. Legacy data loss prevention (DLP) tools don’t address this new status quo.
In the healthcare industry, particularly in the pharmaceutical sector, the threat landscape is particularly complex due to the high value of intellectual property and sensitive patient data.
This episode explore recent research conducted by Selena and her team on TA4903’s distinct objectives.
The public sector is under constant threat from cyber criminals who use advanced tactics such as phishing, ransomware, imposter emails and other methods to exploit employee vulnerabilities.
In today’s cybersecurity landscape, once a cybercriminal has landed one of your users’ credentials, they can access your critical assets to steal your data or ransom your systems in a matter of hours.
It has been a busy first quarter for the Proofpoint Threat Research team!
Impersonation attacks are among the most common and dangerous cyber threats. Bad actors use a variety of tactics to abuse and exploit trusted business communications to initiate attacks.
Cybersecurity is not just about technology; it's also about the people who are impacted by it. Proofpoint’s latest 2024 State of the Phish report highlights the persistent challenge of user behavior in cybersecurity.