Email continues to be the #1 threat vector and using impersonation is a top tactic for attackers. It’s important for organizations to take a holistic approach to protect trusted business communications and minimize impersonation risk.
On this episode of DISCARDED, Selena Larson and guest host Sarah Sabotka explore the evolving tactics of China-based nation-state threat actors with guest Mark Kelly, Staff Threat Researcher at Proofpoint.
ITDR represents a new frontier in cybersecurity, focusing explicitly on protecting user identities and the systems managing them.
Impersonation threats are among the most targeted and deceptive email attacks that exploit your people’s trust.
Mergers and acquisitions greatly increase the number of people sharing confidential information by email, raising the risk of sensitive data being leaked. Proofpoint Adaptive Email Data Loss Prevention (DLP) solves this problem.
Proofpoint Email Data Loss Prevention (DLP) provides visibility and enforcement of email security without the complexity and cost of disparate solutions. It helps organisations protect users from attacks that trick them into sending sensitive data by email.
Proofpoint Inform
While Microsoft has a host of native email security capabilities, they’re simply no match for today’s rapid
Email data loss events such as misdirected emails and emails sent to unauthorized accounts are a prolific problem, putting organizations and customers' data at increasing risk. To prevent these events, organizations need to address the unique email behaviors of each employee.
On this episode of DISCARDED, host Selena Larson is joined by Genina Po, Threat Researcher at Emerging Threats at Proofpoint. Genina shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures.
Proofpoint Account Takeover Protection (ATO Protection) extends the power of Proofpoint Targeted Attack Protection (TAP) by detecting and remediating compromised email and cloud accounts, automatically reverting any malicious changes that the threat actor has made, and quickly removing attackers’
Embarking on an AI initiative? Generative AI platforms like ChatGPT, Microsoft Copilot, and Google Gemini are transforming productivity but also introducing new data security risks that traditional solutions may not address.