News Articles
![The-Hacker-News-logo-2025](/sites/default/files/styles/in_the_news_item/public/logos/The-Hacker-News-logo-2025.png.webp?itok=8vnw3oz9)
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
![Channel-Chiefs-2025_logo](/sites/default/files/styles/in_the_news_item/public/logos/Channel-Chiefs-logo-2025%20%282%29.png.webp?itok=dBUTtrfB)
Proofpoint Leaders Named CRN Channel Chiefs 2025
![security-mag-logo-2025](/sites/default/files/styles/in_the_news_item/public/logos/security-mag-logo-2025.png.webp?itok=_ygshpZh)
Phishing tax scams increase as tax deadlines approach
![Techstrong.ai-logo-2024](/sites/default/files/styles/in_the_news_item/public/logos/Techstrong.ai-logo-2024.jpg.webp?itok=qKZPuXNB)
Beyond the Hype: How to Set Up Your AI Project for Real Success
![CIO](/sites/default/files/styles/in_the_news_item/public/misc/CIO%20LOGO.jpg.webp?itok=3t18_Ym5)
Digital transformation 2025: What’s in, what’s out
![Only Malware in the Building](/sites/default/files/styles/in_the_news_item/public/logos/OMITB_Cover%20Art.png.webp?itok=uI72b4dq)
Malware metamorphosis: 2024 reflections and 2025 predictions.
![Fobes-2024](/sites/default/files/styles/in_the_news_item/public/logos/Forbes_logo-2024.png.webp?itok=J03_peKT)
What Boards Need To Know On Digital And Cybersecurity Governance In 2025
![Fortune-2024-logo](/sites/default/files/styles/in_the_news_item/public/logos/Fortune-media-logo-2024.png.webp?itok=NaP2NMvP)
Cybersecurity leaders scramble to educate employees on generative AI threats
![ISMG](/sites/default/files/styles/in_the_news_item/public/logos/ISMG.png.webp?itok=5dl4MfhP)
Sumit Dhawan: Proofpoint's Road Map for Unified Data Security
![CRN-2024](/sites/default/files/styles/in_the_news_item/public/logos/CRN_2024_New-Website.png.webp?itok=RThxFCMC)
6 Security Vendors Named ‘Leaders’ In Gartner’s Inaugural Email Security Magic Quadrant
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
More information is available at proofpoint.com.
Product Packages
Comprehensive protection against today’s risks — tailored to your organization’s needs.
Learn MoreGet Up to Speed
Explore the latest in cybersecurity news, insights, and innovations.
Resource LibraryTake an Assessment
Get a security audit and custom report of your corporate environment.
GET AN ASSESSMENT