Latest resources from Proofpoint
User Risk Report
Your cybersecurity posture is only as strong as its weakest link. And in today's people-centric threat landscape, that means your users. They are y...
The Business Email Compromise Handbook
A Six-Step Plan for Stopping Payment Redirection, Supplier Invoicing Fraud and Gift Card Scams
Sometimes, that email from your boss isn't rea...
2021 State of the Phish
There's no question that organisations (and individuals) faced many challenges in 2020, both new and familiar. Information security teams felt the ...
