All resources sponsored by:

Proofpoint

20 Matches
Best Practices: Mitigating Insider Threat
sponsored by Proofpoint
WHITE PAPER:Malicious activity from insiders is especially difficult to detect because they’re users privileged access to data. However, they’re also entitled to privacy and due process, so security pros must handle these incidents with greater care than external threats. Download this Forrester report to learn 6 best practices for mitigating insider risk.
Posted: 12 May 2021 | Published: 18 Mar 2021
Get This Now

TOPICS:  .NET

Managing Insider Threats In Financial Services
sponsored by Proofpoint
EBOOK:According to Verizon’s Data Breach Investigation Report, 24% of all security breaches occur at financial institutions – and more than half the attacks on these companies come from insiders. How can these institutions handle this unavoidable risk? Download this e-book for a deeper perspective on insider threats management in financial services.
Posted: 12 May 2021 | Published: 12 May 2021
Get This Now

TOPICS:  .NET

Was Guy Fawkes the Biggest and Boldest Insider Threat Ever
sponsored by Proofpoint
VIDEO:The idea of insider threats has been around forever – conceptually, Guy Fawkes and the Gunpowder Plot of 1605 is not too different than the schemes of today’s malicious insiders. Watch this webinar for a deep dive into the history and evolution of insider threats and discover best practices for protecting your organization going forwards.
Posted: 17 Mar 2021 | Premiered: 05 Nov 2020
Get This Now

TOPICS:  Cybersecurity

Protecting Your Number 1 Threat Vector
sponsored by Proofpoint
VIDEO:Almost every modern cyberthreat involved humans – either as the target, the catalyst or the adversary. This webinar explores how the cyberattack landscape has changed to be more human-focused and offers 6 best practice for how your organization can shift security practices to be more people-centric. Watch now to get started.
Posted: 16 Mar 2021 | Premiered: 16 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Driving Real Behaviour Change to Email
sponsored by Proofpoint
VIDEO:People are increasingly becoming the most common target for today’s cyberattacks – but identifying and proactively protecting those at the greatest risk can be nearly impossible. Watch this webinar to learn how to build a security awareness program that is both people-centric and future-proof.
Posted: 15 Mar 2021 | Premiered: 15 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Unmasking BEC And EAC
sponsored by Proofpoint
WHITE PAPER:The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.
Posted: 12 Mar 2021 | Published: 12 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Analysing The Economic Benefits Of Proofpoint Insider Threat Management
sponsored by Proofpoint
RESEARCH CONTENT:As organizations continue to invest in cybersecurity tools and capabilities, it’s critical that they understand the total economic impact of a buying decision. Read this research report from ESG to unlock a comprehensive analysis into the economic benefits of Proofpoint’s Insider Threat Management (ITM) platform.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now

TOPICS:  Cybersecurity

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK:Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now

TOPICS:  Malware | Security

The Hidden Costs Of Free
sponsored by Proofpoint
WHITE PAPER:As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.
Posted: 10 Mar 2021 | Published: 10 Mar 2021
Get This Now

TOPICS:  Cybersecurity

2021 State Of The Phish
sponsored by Proofpoint
RESEARCH CONTENT:Phishing proved to be one of the most prominent threats of 2020 – luckily, most organizations have taken measures towards addressing this threat in 2021 in the form of phishing tests and security awareness training. Read this State of the Phish report for a comprehensive look into phishing observations, insights and recommendations.
Posted: 10 Mar 2021 | Published: 10 Mar 2021
Get This Now

TOPICS:  Cybersecurity

The 10 Biggest And Boldest
sponsored by Proofpoint
WHITE PAPER:Insider threats can happen anywhere, anytime – and studying real-world examples is the key to understanding how they play out so you can short up your defenses. Read this e-book for an overview of the top 10 insider threat incidents over the past 2 years and discover what you can learn from them to better protect your organization.
Posted: 09 Mar 2021 | Published: 09 Mar 2021
Get This Now

TOPICS:  Cybersecurity

STEP 1: An Overview Of Insider Threat Management
sponsored by Proofpoint
EBOOK:The recent rise of remote and hybrid workforces has increased the prevalence insider threats. In fact, Ponemon reports that insider-caused cybersecurity incidents have grown by 47% since 2018. Read this e-book for an overview of insider threats, including common vulnerability areas and best practices for ensuring protection.
Posted: 09 Mar 2021 | Published: 09 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Stopping BEC And EAC
sponsored by Proofpoint
EBOOK:Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.
Posted: 08 Mar 2021 | Published: 08 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT:Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020
Get This Now


Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK:By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020
Get This Now


Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT:With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
Get This Now


STEP 1: An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK:The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


STEP 2: A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK:In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER:Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020
Get This Now


Cyber insecurity: Managing threats from within
sponsored by Proofpoint
WHITE PAPER:Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


20 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences