As the cyber threat landscape continues to evolve, so does the role of the CISO.
In this extra-packed episode of DISCARDED, host Selena Larson and guest host Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors ar
The healthcare sector is experiencing a surge in AI-augmented cyber threats. From spear phishing to deepfake impersonations targeting high-risk individuals, these threats aren’t random.
Every security team knows the story. The digital workspace is expanding. Cybercriminals are getting smarter. Tools are piling up. Budgets are tighter than ever. And the demand to deliver measurable outcomes keeps rising.
Human-centric security is the force multiplier in a modern cybersecurity architecture, adapting, connecting and elevating your existing security investments.
For government agencies, institutions and enterprises at large, it’s essential to recognize that the battle to protect enterprise resources has shifted, and why focusing on human behavior has become critical to cybersecurity operations.
In this episode of DISCARDED, host Selena Larson and co-host Tim Kromphardt are joined by Joe Wise, Threat Researcher at Proofpoint, for a deep dive into the chaotic brilliance of mid-tier eCrime actors—including the elusive TA582.
Email threats are becoming more sophisticated, but protecting your people doesn’t have to be complicated. The Protect Your People series explores how Proofpoint makes it faster and easier to defend against today’s most dangerous email attacks.
Built with MSPs in mind, Proofpoint Essentials protects your customers from spam, phishing, business email compromise, malware, advanced ransomware and more.
Stream this episode of DISCARDED for a fascinating behind-the-scenes look at threat actor attribution. Listen as Greg Lesnewich, staff threat researcher at Proofpoint, deep dives into the murky overlap between TA829 (aka RomCom), TA289, and the elusive GreenSec cluster.
Insider threats continue to rise, making them a top cybersecurity concern.
Data loss isn’t always the result of deliberately malicious activity. Sometimes mistakes are made. Of course, with data loss it doesn’t matter if the door was kicked down by an intruder or left open by a careless employee – the consequences can still be severe.