Latest resources from Proofpoint
The Anatomy of an Insider Threat Investigatio...
For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today's cloud-based, mobile a...
Open Channels, Hidden Threats
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and Legal Teams
Business collaboration too...
Phish in a Barrel: Real-World Cyber Attack Ex...
What your users don't know about cyber threats can hurt them—and your organisation. They're constantly being targeted by cyber attacks. Missteps ...
