All Topics
すべて
All Languages

Cultivating Cybersecurity Heroes from Day One: Empowering Employees as Cyber Defenders
Invalid Date
今見る










攻撃の最新動向とニューノーマル時代におけるPeople-Centricセキュリティのブループリント 日本プルーフポイント(株) シニア エバンジェリスト 増田 幸美 Agenda サイバー犯罪エコシステムの変化 Emotetの進化 今、日本で何が起こっているのか? 11月の攻撃キャンペーン PPAP運用について 内部脅威の増加 ... 詳細 かつて憧れの対象だったテレワークは、新型コロナの影響でいまや当たり前の世界となりました。一方で、急ごしらえしたリモートワーク環境にセキュリティが追い付かず、日本各地で大規模なサイバー攻撃が後を絶ちません。 さらにWindows10の普及などにより、システムの脆弱性をつくことが難しくなり、攻撃者の狙いは「人」の脆弱性にシフトしてきています。また検知の目をかいくぐるために、攻撃者はOffice365などの正規のテナントをマルウェア配信サーバーとして使うなど、攻撃手法も変化してきています。 本ウェビナーでは、国家間でのハッキングの実情、一般のサイバー犯罪者の兵器の高度化などを、Emotetや二重脅迫ランサムウェアを例に分かりやすく解説いたします。 また11月の日本に着弾している脅威の概況、リモートワークで気を付けていただきたい点、パスワードつきZipをメールで送付するPPAPへの対応策/代替策など、昨今日本で話題となっているセキュリティ事情を織り交ぜてお伝えします。 ぜひ、今後、サイバー攻撃に対する効果的な対策を考えるヒントにして頂ければ幸いです。 Read Less
参加するInvalid Date
Cybercriminals continue to evolve their tactics by leveraging generative AI, QR codes, and exploiting multiple digital channels to launch attacks targeting your employees. Despite advanced security measures, human ... 詳細 behavior remains the biggest factor in cyber risk. But what if, instead of being the weakest link, employees became a strong line of defense? Read Less
今見るInvalid Date
Your organization wants to embrace diverse digital communication channels beyond email to communicate efficiently internally and to engage effectively externally. Think mobile, meetings, enterprise collaboration, social ... 詳細 media, email, voice, files and much more. But doing so opens you up to increased compliance and security risks, greater IT complexity and challenges that undermine your ability to enable corporate and regulatory compliance and improve investigations readiness. A sound Digital Communications Governance (DCG) strategy, coupled with proven technology, can help mitigate these risks and challenges. Read Less
今見るInvalid Date
Proofpoint User Protection gives your users an extra layer of protection beyond email. It automates risk-based learning for your Top Clickers and Very Attacked People (VAPs). With a seamless user experience, it ... 詳細 it blocks malicious URL links that are delivered in messaging and collaboration applications. It also uses AI-based detections and automates remediations to defend against account takeovers, accelerating threat response. Read Less
今見るInvalid Date
Proofpoint Collab Protection extends phishing protection beyond email. It can stop malicious phishing messages in any messaging or collaboration application. Its URL reputation inspection and analysis detects and blocks ... 詳細 these threats in real time. A unified view of threats across all channels helps your security and IT teams track and mitigate phishing threats faster. With Collab Protection, you can protect your people from advanced phishing attacks anytime, anywhere. Read Less
今見るInvalid Date
Proofpoint has ranked highest in four out of five Use Cases in the 2025 Gartner® Critical Capabilities for Email Security Platforms report. These include core email protection, outbound security, security platforms and ... 詳細 power user Use Cases. The report, a companion to the Gartner® Magic Quadrant™ for Email Security Platforms, offers a deeper analysis of vendors’ products and services. It allows for comparison against a set of five key use cases to understand how different platforms support your unique business and technical requirements. Our key highlights include: Insights into how vendors are adapting to the evolving threat landscape Guidance for security and risk management leaders in selecting the best solution Proofpoint’s rankings across the five key use cases, which we believe demonstrate the overall strength of our email security solution See why Gartner ranked Proofpoint highest in four out of five use cases by downloading your copy of the report today. Gartner, Critical Capabilities for Email Security Platforms, Nikul Patel, Franz Hinner, Deepak Mishra, Max Taggett, 15 January 2025. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, INC. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Read Less
今見るInvalid Date
The global datasphere is expected to grow to 163 zettabytes by 2025. With nearly half of all data predicted to reside in public clouds, organizations face unprecedented challenges in managing visibility, access, and ... 詳細 compliance. Security teams must adapt to tackle this growing complexity. Read Less
今見るInvalid Date
Any effective insider risk management (IRM) program needs processes, procedures and guidelines for handling data, protecting user privacy and keeping intellectual property safe. But establishing all these policies can ... 詳細 require quite a balancing act. Departments across the enterprise must be on board. How do you get everyone on the same page to ensure that your program effectively balances privacy, security and culture? Download this e-book to explore the five best practices for getting teams, including legal and human resources, to work cross-functionally. You’ll learn: Guidelines for handling data and why it is important to be transparent Strategies for protecting employees’ rights and eliminating bias from investigations What technical controls to look for in an IRM solution to ensure user privacy Download this e-book now to ensure that your human-centric IRM program is successful. Read Less
今見るInvalid Date
A toolkit to help gather internal DSPM requirements and evaluate vendors Choosing the right Data Security Posture Management (DSPM) solution can be overwhelming. With myriad vendors offering various capabilities, making ... 詳細 the right decision is crucial for your organization’s data security and compliance. Inside the Guide: An overview of DSPM and its critical role in modern data security Key considerations for vendor selection Detailed DSPM solution criteria Implementation strategies and potential pitfalls Measuring ROI with key performance indicators (KPIs) Bonus: Vendor evaluation template Equip your organization with the knowledge and tools to make well-informed decisions in the complex DSPM vendor landscape. Download the Buyer’s Guide now and fast-track your research and evaluation process. Read Less
今見るInvalid Date
As AI models like DeepSeek and ChatGPT push the boundaries of technology, organizations face evolving challenges to keep data safe. This webinar explores DeepSeek's capabilities compared to other AI models and ... 詳細 demonstrates how Proofpoint's human-centric platform provides robust data security in this dynamic landscape. Read Less
今見るInvalid Date
In today’s evolving cybersecurity landscape, state and local governments face significant challenges as they navigate complex threats and limited resources. With federal cybersecurity funding now in its third year, some ... 詳細 state and local governments are trying to figure out how to secure funding, while others are trying to use these funds effectively. To achieve these goals, many are adopting a whole-of-state approach. This is a comprehensive cybersecurity strategy that emphasizes collaboration and resource-sharing across state agencies, local governments and tribal entities. Download the report to learn how: A whole-of state approach can bolster cybersecurity funding This approach helps secure resources to protect the No. 1 Threat vector: email Proofpoint and AWS support the whole-of-state approach Download your copy now. Read Less
今見るInvalid Date
Cybercrime has become a multi-trillion-dollar industry. According to Cybersecurity Ventures, global cybercrime costs, including email attacks, are expected to soar to $10.5 trillion annually by 2025, up from $3 trillion ... 詳細 in 2015. Fueled by the rapid adoption of generative AI and advanced social engineering techniques, cybercriminals have ramped up the volume and sophistication of email-based threats. By targeting and exploiting your people, they can cause significant harm to your organization, leading to intellectual property theft, financial losses, fraud, and many other damaging outcomes. So, how can you protect your business from these cybercriminals? Join us for a 3-part 30-minute webinar series that explores the most common and dangerous cybercriminal threats today — Phishing, Business Email Compromise (BEC), and Ransomware— and offers practical strategies to safeguard your people and organization. In this webinar series, you will gain insights into: The latest trends in the threat landscape The anatomy of these attacks Real-world threat examples Best practice prevention techniques Read Less
今見るInvalid Date
Business Email Compromise (BEC) attacks are a well-known cybersecurity risk, responsible for $2.9 billion in financial losses in 2023 alone (FBI). But there’s an even more insidious threat on the rise: Vendor Email ... 詳細 Compromise (VEC). VEC infiltrates trusted supplier email accounts to launch sophisticated fraud that can disrupt your organization both financially and operationally. If your organization relies on third-party suppliers, this is a cybersecurity gap you can’t afford to ignore. Read Less
今見る