• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Proofpoint

Microsoft Teams attack

Research: Microsoft Teams Can Be Used for Malware Delivery

May 18, 2023 Zachary Comeau Leave a Comment

It is common knowledge that Azure, PowerShell, Exchange and other Microsoft Tools and services are popular targets of threat actors, but Microsoft Teams is emerging as one of the most targeted Microsoft applications for attackers. According to enterprise security firm Proofpoint, Microsoft Teams is now one of the 10 most targeted sign-in applications, with nearly […]

Read More

Proofpoint CISO, CISOs cyberattack

CISOs Are Less Confident in Their Organization’s Security in 2023

May 16, 2023 Zachary Comeau Leave a Comment

The pandemic introduced an entirely new way of working that delighted many end users, but IT departments and cybersecurity professionals had their work cut out for them as they were required to deploy, manage and secure technologies designed to support distributed work. That shift to distributed work resulted in new cyberattack vectors that had even […]

Read More

SASE, SASE approaches, SASE implementation

Proofpoint Unveils New Innovations to Combat Increasingly Common Threats

April 24, 2023 TD Staff Leave a Comment

Ahead of the 2023 RSA Conference, Proofpoint, Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company, unveiled a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms. The company’s latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider […]

Read More

Phishing, Email security

Phishing Remains a Favorite Hacking Tool as New Methods Emerge

March 3, 2023 Zachary Comeau Leave a Comment

Phishing, social engineering, and ransomware remain favorite attack methods of cybercriminals, but threat actors are beginning to shift to newer techniques, such as phone-oriented attack delivery and adversary-in-the-middle phishing proxies designed to bypass multifactor authentication, according to cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s’ State of the Phish report finds that email-based phishing attacks remain […]

Read More

Atera ESET Integration

Hackers Are Pivoting to OneNote Documents for Malware Delivery

February 6, 2023 Zachary Comeau Leave a Comment

Threat actors are increasingly using OneNote documents to deliver malware as Microsoft makes it difficult for them to use other Office documents by blocking macros by default. Now, hackers are experimenting with other file types, including using virtual hard disk, compiled HTML and OneNote, according to new research from enterprise security software company Proofpoint. The […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Proofpoint to Acquire ITDR Company Illusive

December 13, 2022 Alyssa Borelli Leave a Comment

Proofpoint Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company has entered into a definitive agreement to acquire Illusive, the Identity Threat Detection and Response (ITDR) company​. The acquisition is expected to close by January 2023, subject to customary closing conditions. The cost of the acquisition was not disclosed. With the acquisition, Proofpoint says it will […]

Read More

Board members CISOs

Board Members, CISOs Aren’t on the Same Page

October 5, 2022 Zachary Comeau Leave a Comment

Despite a global refocusing on cybersecurity priorities over the last few years, nearly half of board members at organizations across the globe feel unprepared to respond to a targeted cyberattack, and nearly two-thirds say they are at risk within the next 12 months, data which suggests a disconnect between boards of directors and CISOs. That […]

Read More

cybersecurity Proofpoint compliance

Proofpoint Launches Intelligent Compliance Platform

August 26, 2022 TD Staff Leave a Comment

Proofpoint, the Sunnyvale, Calif., cybersecurity and compliance company launched an intelligent compliance platform, offering enterprises regulatory compliance safeguards while simplifying corporate legal protection practices. The platform leverages Proofpoint’s proprietary machine learning engine to provide business leaders with AI powered collection, clarify classification, detection, prevention, search, e-discovery, supervision and next gen predictive analytics while meeting complex […]

Read More

Cloud Security, Wiz

Third Parties and Partners are Leading to Increased Cyber Risk

August 18, 2022 Zachary Comeau Leave a Comment

The continued migration to the cloud and a reliance on third parties and partners is exacerbating the risk of cybersecurity threats breaking through the supply chain, according to new research from cybersecurity firm Proofpoint. The Sunnyvale, Calif.-based company’s report, in collaboration with The Cloud Security Alliance—a consortium of leading IT and security companies such as […]

Read More

Microsoft 365 domain, cloud.microsoft

With Microsoft Office Macros Blocked by Default, Hackers are Using Other Techniques

July 29, 2022 Zachary Comeau Leave a Comment

After pausing the rollout of a default macro-blocking feature in Microsoft Office, Microsoft is now officially blocking VBA macros by default in Office applications in a move to make it harder for threat actors to deploy malware and ransomware using Office applications. Microsoft first announced the VBA macro blocking in February 2022, just a few […]

Read More

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.