Latest resources from Proofpoint
Driving Real Behaviour Change
Starting a new training programme may seem daunting. Maintaining one that keeps your users engaged, changes their behaviour and reduces your organi...
The Anatomy of an Insider Threat Investigatio...
For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today's cloud-based, mobile a...
The Business Email Compromise Handbook
A Six-Step Plan for Stopping Payment Redirection, Supplier Invoicing Fraud and Gift Card Scams
Sometimes, that email from your boss isn't rea...