Latest resources from Proofpoint

Stopping BEC and EAC Scams: A Guide for CISOs...
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defences. Cyber attackers have c...

User Risk Report
Your cybersecurity posture is only as strong as its weakest link. And in today's people-centric threat landscape, that means your users. They are y...

2021 Voice Of The CISO Report
There's no question that 2020 was a challenging year. The pandemic placed an enormous strain on the global economy, and cyber criminals took advant...