All Topics
All
English
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=2LYyrPN7 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=2LYyrPN7 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=Ml901pEA" width="600" height="185" alt="Human Factor 2023" typeof="foaf:Image" /> </picture>)
AI, Data Security and CISO Shifts: Top Cybersecurity Trends to Watch in 2025
Mon, November 25, 2024 1:40 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=bsoshKmG 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=HWbv0ZxT 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=HWbv0ZxT 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=bsoshKmG 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=HWbv0ZxT 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/GettyImages-825151062-min.jpeg.webp?itok=HWbv0ZxT" width="600" height="185" alt="Identity Threat Defense" typeof="foaf:Image" /> </picture>)
74% of CISOs Believe that People Are Their Company’s Biggest Vulnerability, 2024 Voice of the CISO Report Reveals
Tue, May 21, 2024 12:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=TnwsX-rP 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=TnwsX-rP 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-abstract-connections.jpg.webp?itok=O2A0V5GF" width="600" height="185" alt="Abstract connections" typeof="foaf:Image" /> </picture>)
Ultimate Guide to The POPIA - South Africa’s Privacy Law
Mon, May 13, 2024 10:10 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=04w3JHUw 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=w2ikkpy_ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=w2ikkpy_ 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=04w3JHUw 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=w2ikkpy_ 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/btc-imgs/GettyImages-1451242291-min.jpg.webp?itok=w2ikkpy_" width="600" height="185" alt="Proofpoint Packages" typeof="foaf:Image" /> </picture>)
Complying with NIS 2 Directive and DORA – are you prepared?
Wed, March 13, 2024 4:24 PM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=EDIV02pk 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=hb1WH7Ol 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=hb1WH7Ol 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=EDIV02pk 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=hb1WH7Ol 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-nocover-HumanFactor-2023.jpeg.webp?itok=hb1WH7Ol" width="600" height="185" alt="Human Factor 2023" typeof="foaf:Image" /> </picture>)
Proofpoint's 2024 Predictions: Brace for Impact
Wed, November 29, 2023 7:05 AM UTC (UTC +00:00)
Watch Now" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=0KO4jkJu 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=zWe1t7E9 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=zWe1t7E9 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=0KO4jkJu 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=zWe1t7E9 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/leveraging-intelligence-in-security-strategy1400x540.png.webp?itok=zWe1t7E9" width="600" height="185" alt="Thinking Ahead of Attackers" title="Thinking Ahead of Attackers" typeof="foaf:Image" /> </picture>)
" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=VmicO91M 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=jJ_FmTnK 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=jJ_FmTnK 1x" media="screen and (min-width: 1440px)" type="image/webp" width="600" height="185"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=VmicO91M 1x" media="screen and (min-width: 1024px)" type="image/webp" width="440" height="150"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=jJ_FmTnK 1x" media="screen and (min-width: 480px)" type="image/webp" width="600" height="185"/> <img loading="lazy" src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-us-leadership-presentation.jpg.webp?itok=jJ_FmTnK" width="600" height="185" alt="Leadership presentation" typeof="foaf:Image" /> </picture>)
Board Member Cybersecurity Posture Report Breakdown
Wed, September 6, 2023 12:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/Man_Walking_3.png.webp?itok=ziNtDuPE 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 480px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 1440px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/Man_Walking_3.png.webp?itok=ziNtDuPE 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 480px)" type="image/webp"/> <img src="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy" alt="Man_Walking_3" typeof="foaf:Image" /> </picture>)
Third Annual Voice of the CISO Report Shows CISOs Have Returned to Elevated Levels of Concern, Feel Less Confident About Cyber Preparedness
Tue, May 9, 2023 12:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/Man_Walking_3.png.webp?itok=ziNtDuPE 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 480px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 1440px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/Man_Walking_3.png.webp?itok=ziNtDuPE 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy 1x" media="screen and (min-width: 480px)" type="image/webp"/> <img src="/sites/default/files/styles/image_600_185/public/blog-banners/Man_Walking_3.png.webp?itok=5G2C3ODy" alt="Man_Walking_3" typeof="foaf:Image" /> </picture>)
The Evolution of the CISO Role and the Skills Gap
Mon, April 10, 2023 3:00 PM UTC (UTC +00:00)
Watch Now" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=4xbLvZj3 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=b8_COOVB 1x" media="screen and (min-width: 480px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=b8_COOVB 1x" media="screen and (min-width: 1440px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_440_150/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=4xbLvZj3 1x" media="screen and (min-width: 1024px)" type="image/webp"/> <source srcset="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=b8_COOVB 1x" media="screen and (min-width: 480px)" type="image/webp"/> <img src="/sites/default/files/styles/image_600_185/public/blog-banners/pfpt-sat-blog-banner-3.jpg.webp?itok=b8_COOVB" alt="Security Awareness Training" typeof="foaf:Image" /> </picture>)