Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

OTHER ON-DEMAND WEBINARS

Debunking 7 Myths About AI in Performance Management

Generative AI has taken the world of work by storm, and left many HR leaders wondering how to best apply it to HR processes — or if we even should. Considerations around privacy and bias are factoring into adoption of AI in performance management, and many business leaders simply don’t know how to determine whether it’s worth th
Watch Now

Adopting a Purpose-Built Approach to Linux Security

Carbon Black

Cloud is the dominant computing trend of our time, and Linux is the power behind it. As enterprises continue to adopt more cloud native infrastructure, we see accelerated adoption of Linux in the form of both migrations of existing infrastructure and greenfield application deployment. Unfortunately the approach to securing this growing fleet of production servers has not evolved at the same pace.
Watch Now

After the Data Breach: Stolen Credentials

Security Boulevard

When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Watch Now

Exciting Updates for Threat Response Cloud and TRAP 5.8

As security products move more into the cloud, Proofpoint continues to strengthen our Threat Response Auto-Pull solution. Join us for this customer session to learn about new features available to you, including our new audit-logging, internal incident response, and enhanced visualizations in Threat Response Cloud. We also have exciting new updates for TRAP 5.8 on-prem.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

resources