Please turn on your JavaScript for this page to function normally.
Proofpoint unveils people-centric innovations across its three platforms

Proofpoint announced several people-centric innovations across its three flagship platforms: Threat Protection, Compliance, and the new Information Protection and Cloud …

HackerOne hires new leaders to drive the product roadmap

HackerOne announced that it is doubling down on its investment in innovation with the hiring of new leaders to drive the product roadmap. Ashish Warty has come aboard as …

Thoma Bravo to acquire Proofpoint in a $12.3B transaction

Proofpoint announced that it has entered into a definitive agreement to be acquired by Thoma Bravo in an all-cash transaction that values Proofpoint at approximately $12.3 …

Cofense acquires Cyberfish to eliminate the need for legacy email security solutions

Cofense announced the acquisition of Cyberfish, provider of next-generation phishing protection powered by Computer Vision and advanced Machine Learning (ML) technology. By …

email
Phishers’ perfect targets: Employees getting back to the office

Phishers have been exploiting people’s fear and curiosity regarding breakthroughs and general news related to the COVID-19 pandemic from the very start, and will …

Proofpoint acquires InteliSecure to strengthen its cloud-based people-centric security platform

Proofpoint has entered into a definitive agreement to acquire InteliSecure. With this acquisition, Proofpoint looks to strengthen its cloud-based people-centric security …

user
Most CISOs believe that human error is the biggest risk for their organization

53% of CISOs and CSOs in the UK&I reported that their organization suffered at least one significant cyberattack in 2020, with 14% experiencing multiple attacks, a …

lock
Retail CISOs and the areas they must focus on

In this interview, Matt Cooke, cybersecurity strategist, EMEA at Proofpoint, discusses the cybersecurity challenges for retail organizations and the main areas CISOs need to …

Eyes
Mapping the motives of insider threats

Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your …

New Proofpoint Enterprise Archive capabilities help streamline e-discovery and supervision processes

Proofpoint announced numerous enhancements to its award-winning Proofpoint Enterprise Archive solution to help customers streamline e-discovery and supervision processes and …

coronavirus
Criminals boost their schemes with COVID-19 themed phishing templates

Phishers are incessantly pumping out COVID-19 themed phishing campaigns and refining the malicious pages the targets are directed to. “Credential phishing attackers …

Zoom
Phishers exploit Zoom, WebEx brands to target businesses

Proofpoint researchers have spotted and documented email phishing campaigns targeting US companies in a variety of industries with emails impersonating Zoom and Cisco (Webex). …

Don't miss

Cybersecurity news