Latest resources from Proofpoint

Driving Real Behaviour Change
Today's most potent cyber threat isn't a zero-day vulnerability, new malware or the latest exploit kit. It's your own users. That's because today's...

Stopping BEC and EAC Scams: A Guide for CISOs...
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defences. Cyber attackers have c...

2022 Voice of the CISO
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020's scramble to enable remote working fadin...