Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Accelerate investigation with Proofpoint Threat Response | Live Demo
    Accelerate investigation with Proofpoint Threat Response | Live Demo
    Frank Tsang, Principle Systems Engineer Recorded: Nov 15 2018 32 mins
    Accelerate investigation, prioritize threats, and resolve incidents with less time and effort.

    Proofpoint Threat Response Auto-Pull (TRAP) offers an effective solution. It automatically pulls delivered malicious email into quarantine, saving you from slow and labor-intensive manual process.

    Join us for a live demo of the Proofpoint Threat Response platform and learn how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Weekly Threat Byte | Param Backwards
    Weekly Threat Byte | Param Backwards
    Proofpoint Recorded: Nov 13 2018 11 mins
    For this week’s Interesting Threat Byte, we bring you Marap. Marap, param backward, is part of a group of recently discovered downloader malware.

    Marap is targeting financial institutions and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code. It is possible that this malware is currently doing reconnaissance to determine if there is data the threat actor wants.
  • Weekly Threat Byte | Hurricane Michael Exploits
    Weekly Threat Byte | Hurricane Michael Exploits
    Proofpoint Recorded: Nov 13 2018 7 mins
    For this week’s Interesting Threaty Byte, we bring you Hurricane Michael Exploits. Hurricane Michael Exploits are a group of phishing campaign schemes that utilized the Hurricane Michael disaster as a way to exploit victims and people that would like to help. Typically threat actors go after credit card numbers that are given to them through fradulent donation sites and emails. The Hurricane Michael Exploits are different in that they focus on the current phishing trend of convincing victims to give their webmail credentials instead of credit card numbers. This new method shows the threat actor's desire to access victim's webmail applications instead of directly going after money.
  • From Legacy to the Cloud: Modernizing your Archiving Strategy
    From Legacy to the Cloud: Modernizing your Archiving Strategy
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager Recorded: Nov 13 2018 59 mins
    Many organizations have already deployed a compliance solution but the continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily, and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join this session to discuss what a modern archiving strategy looks like, and how you get there:

    - What’s involved in the move – Policy, Planning, and People
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Cybersecurity for the Modern Era - join us on the 20th November
    Cybersecurity for the Modern Era - join us on the 20th November
    Proofpoint Recorded: Nov 9 2018 1 min
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us on the 20th November, live from the studio with our line up of industry experts, part of our Hacking Human Nature Summit to hear how they are building people centric strategies. Links in the attachments.
  • Hacking Human Nature - Proofpoint Summit 20th-21st November 2018
    Hacking Human Nature - Proofpoint Summit 20th-21st November 2018
    Proofpoint Recorded: Nov 9 2018 1 min
    Who's being attacked, how they're attacked and how to protect them. Join our summit on the 20th - 21st November to find out more. Links in the attachments.

    The threat landscape has fundamentally changed. Cyber criminals now target humans, not infrastructure. 90% of targeted cyber-attacks start with email. Proofpoint provides solutions to protect, defend and respond to malware, phishing and email fraud- helping you safeguard your greatest asset - your people.
  • Weekly Threat Byte | Danabot Goes International
    Weekly Threat Byte | Danabot Goes International
    Proofpoint Recorded: Nov 8 2018 10 mins
    For this week's Interesting Threat Byte, we bring you Danabot. Danabot was first seen in Australia, but has since migrated to the United States The malware will check the victim's geolocation to determine whether or not to install.

    If the location is right it will install. Once installed, among other things, it willthe download web injects to trick the victim into giving up personal information to threat actors, particularly banking information.

    Learn all about this malicious threat in the video and be sure to check back each week of next week's Threat Byte.
  • Weekly Threat Byte | Q3 Trends
    Weekly Threat Byte | Q3 Trends
    Proofpoint Recorded: Nov 8 2018 8 mins
    For this week’s Interesting Threat Byte, we bring you a summary of Proofpoint's recent quarterly threat Report.

    Banking malware, malware that attempts to steal banking credentials from victims, and miners, malware that uses a victim's CPU to mine cryptocurrency, are big and on the rise in 2018. Malicious links in emails are on the rise while malicious file in emails are on the decline. Check out the video for more on where Ransomware, RATs and other malware land in the current threat landscape
  • Email Protection Demo - Staying Secure in Office 365
    Email Protection Demo - Staying Secure in Office 365
    Andres Bore - Senior SE, Proofpoint Recorded: Nov 7 2018 54 mins
    Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

    Proofpoint’s Email Protection and Targeted Attack Protection solutions can help.

    Join this webinar and learn about:

    •Today’s threat landscape and how to build your defense against spam, malware, and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Storm Clouds Brewing – How to Defend Against Stolen Cloud Accounts
    Storm Clouds Brewing – How to Defend Against Stolen Cloud Accounts
    Eric Schwake Group Product Marketing Manager; Itir Clarke Senior Security Strategist Recorded: Oct 31 2018 61 mins
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join our security experts and learn:

    • The damage compromised accounts cause, from stolen customer data to phishing
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure

Embed in website or blog