Latest resources from Proofpoint

Driving Real Behaviour Change
Today's most potent cyber threat isn't a zero-day vulnerability, new malware or the latest exploit kit. It's your own users. That's because today's...

2022 Social Engineering Report
In our latest social engineering report, Proofpoint researchers analyse key trends and behaviours in social engineering that highlight some common ...

Modern Blueprint to Insider Threat Management...
Taking a People-Centric Approach to Your Insider Threat Management (ITM) Programme.
Insider threats can have disastrous consequences, such as...