Latest resources from Proofpoint

The Anatomy of an Insider Threat Investigatio...
For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today's cloud-based, mobile a...

Phish in a Barrel: Real-World Cyber Attack Ex...
What your users don't know about cyber threats can hurt them—and your organisation. They're constantly being targeted by cyber attacks. Missteps ...

Analyzing the Economic Benefits of Insider Th...
Did you know the average annual cost for insider threats is now $11.45M, according to Ponemon Institute? It's a growing problem as remote teams bec...