All Topics
All
English
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=hAln2-5k 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-connect-light.jpg.webp?itok=kJw295dC" width="600" height="185" alt="Connect light" typeof="foaf:Image" /> </picture>)
Training Your LLM Dragons—Why DSPM is the Key to AI Security
Fri, January 10, 2025 5:59 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=fBtWIJT- 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=Xlc1Z_II 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=Xlc1Z_II 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=fBtWIJT- 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=Xlc1Z_II 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-woman.jpg.webp?itok=Xlc1Z_II" width="600" height="185" alt="Leadership woman" typeof="foaf:Image" /> </picture>)
Insider Breach of the Month: An Employee Exfiltrates Sensitive Data from a Mid-Size Finance Firm
Wed, December 18, 2024 3:52 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=k1YvyAin 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=xJPUttyb 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=xJPUttyb 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=k1YvyAin 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=xJPUttyb 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=xJPUttyb" width="600" height="185" alt="Identity Threat Defense" typeof="foaf:Image" /> </picture>)
Why a Global Services Company Chose Proofpoint to Defend Its Data
Wed, December 11, 2024 3:02 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=2LYyrPN7 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=2LYyrPN7 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA" width="600" height="185" alt="Human Factor 2023" typeof="foaf:Image" /> </picture>)
AI, Data Security and CISO Shifts: Top Cybersecurity Trends to Watch in 2025
Mon, November 25, 2024 1:40 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=2nrkyn5W 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=sBI-MRRJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=sBI-MRRJ 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=2nrkyn5W 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=sBI-MRRJ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-banner-threat-research.jpg.webp?itok=sBI-MRRJ" width="600" height="185" alt="Cyber Criminal" typeof="foaf:Image" /> </picture>)
New Innovations That Help You to Better Defend Data and Mitigate Insider Risk
Tue, November 19, 2024 2:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=TnwsX-rP 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=TnwsX-rP 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF" width="600" height="185" alt="Abstract connections" typeof="foaf:Image" /> </picture>)
How the Proofpoint Endpoint Agent is Designed to Avoid Major IT and Security Outages
Wed, November 6, 2024 8:19 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=m3Qm5wOu 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=OqoREQhP 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=OqoREQhP 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=m3Qm5wOu 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=OqoREQhP 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/security-days-2022-spring-hero_1400_540.png.webp?itok=OqoREQhP" width="600" height="185" alt="seminar" title="seminar" typeof="foaf:Image" /> </picture>)
How Proofpoint Information Protection Provides Value for Customers
Thu, October 31, 2024 9:01 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=gNdJiWhi 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=dS4J54Ic 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=dS4J54Ic 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=gNdJiWhi 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=dS4J54Ic 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-dlp-blog-banner-2.jpg.webp?itok=dS4J54Ic" width="600" height="185" alt="Data Loss Prevention" typeof="foaf:Image" /> </picture>)
Generative AI: How Can Organisations Ride the GenAI Wave Safely and Contain Insider Threats?
Tue, September 24, 2024 3:14 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=IZv7-TtD 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=0dtNGkJa 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=0dtNGkJa 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=IZv7-TtD 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=0dtNGkJa 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-1194517378-min.jpg.webp?itok=0dtNGkJa" width="600" height="185" alt="Identity Threat Defense" typeof="foaf:Image" /> </picture>)
A New Hire’s First 90 Days: What Could Possibly Go Wrong?
Tue, September 17, 2024 1:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=gfsz6WnA 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=D0v62Ufi 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=D0v62Ufi 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=gfsz6WnA 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=D0v62Ufi 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-blog-ciso.jpg.webp?itok=D0v62Ufi" width="600" height="185" alt="CISO" typeof="foaf:Image" /> </picture>)
5 Steps to Building an Insider Risk Programme
Thu, September 12, 2024 1:00 PM UTC (UTC +00:00)
Watch Now