This episode of DISCARDED features Andrew Couts, Senior Editor, Security and Investigations at WIRED.
If your organization stores, processes, or transmits cardholder data, compliance with the PCI Data Security Standard (PCI DSS) is essential—this includes any third-party storage and archive hosting providers.
In this post-RSA fireside chat, two of Proofpoint’s executive leaders will unpack the latest innovations unveiled at RSA and discuss how they reflect our ongoing execution of a bold vision: to stop all human-centric threats, transform data security, and empower security teams.
On this episode of DISCARDED, Proofpoint's threat researchers explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access So
On this episode of DISCARDED, the Proofpoint threat research team dives into the realities of current social engineering schemes —especially during high-risk times like tax season.
On this episode of DISCARDED, the team explores the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses.
Data incidents caused by misdirected emails and email exfiltration are at the forefront of today's security challenges, with insiders often contributing to the most devastating breaches.
Email data loss prevention (DLP) is a critical component of your organization’s overall data security strategy.
Attacks that target Microsoft are rising. To quickly plug the holes in their Microsoft 365 email security, many businesses are turning to API-based email security tools. Unfortunately, these tools often aren’t up to the challenge.
This white paper provides a technical deep-dive into the Proofpoint Core Email Protection API and Adaptive Email DLP products.
Abandoned data is more than wasted storage; it’s a hidden security risk. Unused data stores, left behind in migrations or legacy systems, quietly accumulate, increasing your attack surface and storage costs.
Protecting sensitive data in AI and LLM workflows is a mission-critical priority to avoid privacy violations, data breaches, and regulatory fines. Enterprises need to mitigate the risks of exposing sensitive data to AI systems in dynamic hybrid environments.