Every industry sector has recent history of organizations that have been hit - and hit hard - by hackers and cybercriminal organizations. I don't need to mention names -
you know who they are. Each week, more are added to the hit parade of organizations that, for one reason or another, didn't have the right measures...
Security incidents have been on the rise for the past few years, and most experts in cyber security believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry,...
You can't secure what you don't know you're using, especially cloud services. To safeguard data stored in the cloud, enterprises must accurately inventory their cloud computing contracts.
A judge has dismissed a class-action lawsuit against Michaels, filed after the retailer warned that POS malware-wielding attackers had successfully stolen details of an estimated 2.6 million payment cards. But the ruling isn't a surprise - here's why.
Your email inbox is a dangerous place. Threat actors use "phishing" tactics to lure people into opening infected attachments that lead to the installation of malware and viruses on individual computers or an entire network. Phishing tactics are becoming increasingly sophisticated and common, and organizations need to...
Today's threat environment is complex and dynamic. Organizations today face Advanced Persistent Threats (APTs) and organized, criminally motivated attacks launched by adversaries with the tools, training, and resources to breach most conventional network defense systems. These incursions are not conducted as...
Cyber Jedis know that Star Wars provides a wealth of incidents worthy of study. In fact, the entire story of Episode IV: A New Hope centers around the response to and consequences of a data breach, culminating in the destruction of the Death Star. If the Empire had been able to make sense of the intelligence they...
Migrating to a cloud-based service like Office 365 is essential for moving your business forward, but it's no walk in the park. Although this platform meets the needs of IT, the architecture leaves several gaps concerning security, legal, and compliance stakeholders that need to be addressed.
This white paper...
Cybercriminals are increasingly targeting mobile users, and when it comes to mobile apps, nothing is sacred. Many criminals mimic popular and trusted apps, tricking users into downloading them and then reaping the profits.
This white paper explores the dangers of malicious mobile apps and gives you advice on...
Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments,...
Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats - and sometimes take their eye off old ones - and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case...
As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways (SEG), Proofpoint uniquely combines a world class email gateway solution with the...
For many organizations, outsourcing network security services appears to be a logical choice. You avoid hardware, licensing, and
maintenance costs; you benefit from around-the-clock security monitoring and management from dedicated security experts; and
you free up your in-house IT staff to pursue activities core to...
For the past decade, front office and back office systems such as CRM, payroll, and document management have gradually moved
to the cloud. That change has been relatively seamless. But now enterprises are contemplating and executing the migration of
once immovable major systems that have been ensconced inside the...
Defining an enterprise mobile device passcode policy can be surprisingly difficult. Security managers must attempt to reconcile two opposing goals. They must create a passcode policy that is strong enough to protect the device if it is lost or stolen, while not annoying users with needless length or complexity.
...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.