• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: proofpoint

SASE, SASE approaches, SASE implementation

Proofpoint Unveils New Innovations to Combat Increasingly Common Threats

Proofpoint's latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and more.

April 24, 2023 TD Staff Leave a Comment

Ahead of the 2023 RSA Conference, Proofpoint, Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company, unveiled a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms. The company’s latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Proofpoint to Acquire ITDR Company Illusive

Proofpoint's move to acquire Illusive will enhance its threat and information protection platforms for a more unified solution.

December 13, 2022 Alyssa Borelli Leave a Comment

Proofpoint Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company has entered into a definitive agreement to acquire Illusive, the Identity Threat Detection and Response (ITDR) company​. The acquisition is expected to close by January 2023, subject to customary closing conditions. The cost of the acquisition was not disclosed. With the acquisition, Proofpoint says it will […]

Read More

cybersecurity Proofpoint compliance

Proofpoint Launches Intelligent Compliance Platform

Proofpoint's intelligent compliance solution offers enterprises regulatory compliance safeguards while simplifying corporate legal protection practices.

August 26, 2022 TD Staff Leave a Comment

Proofpoint, the Sunnyvale, Calif., cybersecurity and compliance company launched an intelligent compliance platform, offering enterprises regulatory compliance safeguards while simplifying corporate legal protection practices. The platform leverages Proofpoint’s proprietary machine learning engine to provide business leaders with AI powered collection, clarify classification, detection, prevention, search, e-discovery, supervision and next gen predictive analytics while meeting complex […]

Read More

Microsoft Teams attack

Research: Microsoft Teams Can Be Used for Malware Delivery

Microsoft Teams is now one of the 10 most targeted sign-in applications in Microsoft 365 and can be abused by attackers, Proofpoint says.

May 18, 2023 Zachary Comeau Leave a Comment

It is common knowledge that Azure, PowerShell, Exchange and other Microsoft Tools and services are popular targets of threat actors, but Microsoft Teams is emerging as one of the most targeted Microsoft applications for attackers. According to enterprise security firm Proofpoint, Microsoft Teams is now one of the 10 most targeted sign-in applications, with nearly […]

Read More

Proofpoint CISO, CISOs cyberattack

CISOs Are Less Confident in Their Organization’s Security in 2023

Proofpoint study finds 68% of CISOs now feel at risk for a material cyberattack, compared to just 48% in 2022.

May 16, 2023 Zachary Comeau Leave a Comment

The pandemic introduced an entirely new way of working that delighted many end users, but IT departments and cybersecurity professionals had their work cut out for them as they were required to deploy, manage and secure technologies designed to support distributed work. That shift to distributed work resulted in new cyberattack vectors that had even […]

Read More

Cisco Live 2023

What You Need to Know About Cisco XDR

Cisco is launching a new XDR solution and is bringing more endpoint security capabilities of Duo MFA to all paid editions.

May 1, 2023 Zachary Comeau Leave a Comment

Cisco is launching a new extended detection and response (XDR) solution, this summer, as part of Cisco Security Cloud, a unified, AI-driven, cross-domain security platform designed to converge the company’s expertise and visibility across the network and endpoints into one security solution. The company announced the news during the annual RSA Conference. In addition, the […]

Read More

Security Awareness Training

Security Awareness Training Needs to Change. Here’s Why.

Phishing is still wildly successful and a tried-and-true way into any organization's network, and security awareness training needs to evolve.

March 21, 2023 Zachary Comeau Leave a Comment

Despite repeated urges from IT professionals to be wary of clicking on links in emails and opening attachments from strange messages, phishing is still wildly successful as attackers adopt new tricks and techniques that should force organizations to improve and update their cybersecurity awareness strategies. In fact, email-based phishing attacks remain a thorn in the […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

New methods such as phone-oriented attack delivery and MFA bypass are making phishing attacks more sophisticated, according to Proofpoint.

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

Atera ESET Integration

Hackers Are Pivoting to OneNote Documents for Malware Delivery

Proofpoint researchers say they have identified an increase in the use of OneNote documents to deliver malware after Microsoft blocks macros.

February 6, 2023 Zachary Comeau Leave a Comment

Threat actors are increasingly using OneNote documents to deliver malware as Microsoft makes it difficult for them to use other Office documents by blocking macros by default. Now, hackers are experimenting with other file types, including using virtual hard disk, compiled HTML and OneNote, according to new research from enterprise security software company Proofpoint. The […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: Google, Microsoft Cyberattacks; Gmail UI; ISE 2023

Microsoft consent phishing campaign, Google FI data breach, a new Gmail UI and ISE 2023 highlight this week's IT news.

February 2, 2023 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. Microsoft investigating threat actor consent phishing […]

Read More

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 5
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.