사이버보안 용어 해설
Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data.
The Two Sides of Account Compromise
Recent Proofpoint research reveals that 99%1 of organizations face regular account takeover (ATO) attempts. Attackers often employ phishing and other techniques as part of multi-stage attacks aimed at compromising user accounts.
Healthcare Threat Briefing: A CISO Fireside Chat
As cyber threats evolve, so must our defense strategies — especially in healthcare, where human vulnerability is often the primary target. In this candid fireside chat moderated by Ryan Witt, VP of Industry Solutions, two healthcare CISOs come together to unpack the current threat landscape.
Hiding in Plain Sight: How Attackers Use Images to Bypass Defenses
On this episode of DISCARDED, the team explores the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses.
Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats
This episode of DISCARDED features Andrew Couts, Senior Editor, Security and Investigations at WIRED.
Protecting Cardholder Data with Proofpoint Archive
If your organization stores, processes, or transmits cardholder data, compliance with the PCI Data Security Standard (PCI DSS) is essential—this includes any third-party storage and archive hosting providers.
Executing Our Vision: Proofpoint’s Human-Centric Innovations from RSA
In this post-RSA fireside chat, two of Proofpoint’s executive leaders will unpack the latest innovations unveiled at RSA and discuss how they reflect our ongoing execution of a bold vision: to stop all human-centric threats, transform data security, and empower security teams.
RMM Tools: The New Cybercrime Trick?
On this episode of DISCARDED, Proofpoint's threat researchers explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access So
Reduce Risk and Cost of Abandoned Data with Proofpoint DSPM
Abandoned data is more than wasted storage; it’s a hidden security risk. Unused data stores, left behind in migrations or legacy systems, quietly accumulate, increasing your attack surface and storage costs.
Your Best Defense against Social Engineering: The Gray-Matter Firewall
On this episode of DISCARDED, the Proofpoint threat research team dives into the realities of current social engineering schemes —especially during high-risk times like tax season.
AI-Driven Email Protection: Combatting the Leading Threat in Data Loss
Data incidents caused by misdirected emails and email exfiltration are at the forefront of today's security challenges, with insiders often contributing to the most devastating breaches.
Secure Sensitive Data in AI Pipelines with Proofpoint DSPM
Protecting sensitive data in AI and LLM workflows is a mission-critical priority to avoid privacy violations, data breaches, and regulatory fines. Enterprises need to mitigate the risks of exposing sensitive data to AI systems in dynamic hybrid environments.
Continuous Compliance Made Easy with Proofpoint DSPM
Compliance is no longer just a pre-audit checklist—it’s a continuous process essential to protecting sensitive data and avoiding costly breaches. Modern enterprises face complex regulations like GDPR, CCPA, PCI-DSS, and HIPAA.