Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security Your email has been sent How many employees are taking risky actions? What risky actions are employees taking? Why are ...
TAMPA, Fla., Aug. 20, 2025 (GLOBE NEWSWIRE) -- ConnectWise, the world’s leading software company dedicated to the success of managed service providers (MSPs) and information technology service ...
Human error remains a significant risk for organizations when it comes to cyber threats. In fact, according to Proofpoint’s 2024 Voice of the CISO report, 74% of ...
Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk Your email has been sent This new report also indicates an increasing attack surface as ...
Proofpoint today announced it has entered into a definitive agreement to acquire Hornetsecurity Group, a pan-European provider of AI-powered Microsoft 365 (M365) security, data protection, compliance, ...
SUNNYVALE, Calif. & SAN FRANCISCO--(BUSINESS WIRE)--RSA Conference 2024 – Proofpoint, Inc., a leading cybersecurity and compliance company, today unveiled two industry-first innovations that redefine ...
Cybersecurity firm Proofpoint Inc. today announced four major innovations at its annual Protect 2025 conference that are designed to secure the agentic workpsace. The company’s new collaboration and ...
Forbes contributors publish independent expert analyses and insights. Tony Bradley covers the intersection of tech and entertainment. When the pandemic forced the shift to remote work, many assumed it ...
SUNNYVALE, Calif., Jan. 22, 2020 (GLOBE NEWSWIRE) -- Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced it has achieved Federal Risk and Authorization ...
SUNNYVALE, Calif.--(BUSINESS WIRE)--Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the launch of the industry’s first unified data security solution designed to ...
Artificial intelligence (AI) has the potential to augment human capabilities and transform industries, but the technology can also be used by cyber criminals to conduct targeted threat campaigns at ...