Silicon Valley email security firm Proofpoint is laying off 280 positions two months into the tenure of Sumit Dhawan as its chief executive officer. A company spokesperson said Proofpoint anticipates moving half the eliminated positions to overseas units in Argentina and Ireland by midyear.
Rumors are swirling about how the Department of Health and Human Services lost about $7.5 million in grant payments through a series of cyberattacks last year, including speculation over whether the incidents involved sophisticated AI-augmented spear-phishing or more commonplace fraud schemes.
Our email authentication experts will be on hand to provide their insight and a demonstration of how exactly Proofpoint Email Fraud Defense can help identify and close requirement gaps.
Proofpoint landed top VMware lieutenant Sumit Dhawan as its new chief executive just days after the cloud and virtualization giant was acquired by Broadcom. The Silicon Valley-based email security firm said it liked Dhawan's track record of building security, cloud and end-user computing businesses.
Did you know that in recent years cybercrime has increased during the holidays by as much as 30%1? Organizations become more vulnerable during this time of year due to people taking time off, more distractions occurring outside of work, and scams becoming more prevalent.
With it being a busy time of year both...
Malware families can contain multiple variants, each with different capabilities, delivery methods, or evasion techniques.
As the threat landscape evolves, threat actors constantly improve their malware families to evade detection and achieve their objectives. They may add new features, exploit new vulnerabilities,...
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
If "time is money," why spend it on all of those little tasks in a SOC that can add up, eating away at valuable workday hours? Automating these repetitive, low-level activities can free up valuable time so you can focus on more strategic initiatives, such as threat hunting and improving the overall security...
Proofpoint has agreed to purchase a cloud email security provider founded by HSBC, RBS, Santander and UBS alumni to apply artificial intelligence to evolving threats. The proposed acquisition of Boston-based Tessian will help Proofpoint address common forms of data loss including data exfiltration.
Proofpoint will have its third CEO since March 2022 after tapping recently hired CFO Remi Thomas to become its interim top leader. The company selected Thomas to replace Ashan Willy, who started as Proofpoint's CEO just 19 months ago and is exiting to pursue an opportunity outside cybersecurity.
The advent of generative AI has transformed the way modern organizations operate. While many business users are adopting tools like ChatGPT and Google Bard to enhance productivity, cybercriminals are also capitalizing on this technology—resulting in more attacks with increased sophistication.
To understand how...
Email is a major entry point for threat actors, who have evolved their tactics to bypass traditional security solutions and now leverage AI to make attacks more scalable and harder to detect. In response, organizations are buying AI-enabled solutions to bolster their security posture. This survey shows...
Discover how cybercriminals use generative AI tools like ChatGPT to create more effective email attacks and how to protect your organization from them.
ChatGPT. Google Bard. Midjourney. DeepFaceLab.
Generative AI is all the rage, and for good reason. What used to take hours can now be done in minutes, and what...
This latest Quarterly Threat Report (QTR) distils the trends, notable new behaviours, and unusual attacks we saw over the last quarter. Also utilizing previous threat reports to compare findings and point out patterns–and even provide some solutions for avoiding the latest threats.
By dissecting how attackers got...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.