Imposter email attacks: Overcoming ‘needle-in-a-haystack’ threats

by • 1 week ago

Proofpoint fraud expert Rob Holmes looks at how threat actors are exploiting agency supply chains to launch imposter email attacks and compromise agency networks.

How precise email analysis reduces healthcare ransomware threats

by • 1 month ago

When health-care organizations face ransomware attacks, patients ultimately pay the price. Data-informed cyber defense strategies can help mitigate those risks.

Cyber defense strategies that focus on protecting people

by • 2 months ago

Cybercriminals are increasingly evolving tactics that narrowly target an organization's most significant security risk — its own people.

Social engineering gains momentum with cyber criminals

by • 8 months ago

Public healthcare organizations are increasingly targeted by cyberattacks, prompting security strategies that focus more on people, says IT security expert.

Taking a people-centric approach to federal cybersecurity

by • 1 year ago

New research from Proofpoint shows that the majority of cyberattacks are activated by users opening a file, clicking a link, or other types of action.

Proofpoint’s Tony D’Angelo talks securing email and more

by • 3 years ago

D'Angelo talk about the work Proofpoint is doing securing email and more.