Latest resources from Proofpoint
User Risk Report 2018
Risky end-user behaviours are impacting organisations around the world, with implications that can be immediate (like a ransomware infection) or be...
Breaking Down BEC
The Modern CISO's Framework for Identifying, Classifying and Stopping Email Fraud
Business email compromise (BEC), also known as email fraud,...
Three Reasons to Move from Legacy Data Loss P...
Changing your data loss prevention (DLP) solution is a major transition that can feel overwhelming. But relying on DLP built for an earlier era of ...