Malware
Ransomware Case Studies
Ransomware is a simple name for a complex collection of security threats. Attacks can be short and brutal,...
Advanced Threat Research Report October 2021
As 2021 progressed through its second quarter and into the third, cyber criminals introduced new—and...
CISO strategies for proactive threat prevention
Security leaders are under immense pressure to protect their organizations from cyberattacks. But the...
Privileged Access and the Impact of Pass the Hash Attacks
The goal of this survey was to capture hard data on current experiences, trends and approaches to Identity...
2022 Social Engineering Report
In our latest social engineering report, Proofpoint researchers analyse key trends and behaviours in...
Human Factor Report 2021
Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World As the global pandemic upended...
Shift your Web Security to the Cloud, for the Cloud
As enterprises embrace digital transformation, the adoption of software-as-a-service (SaaS) is robust...
Cloud-delivered security for the digital workspace
With the adoption of hybrid cloud and the rise in remote work, traditional connectivity models like VPN...
MITRE Engenuity™ ATT&CK® Evaluation
MITRE has become the common language of EDR and is the de facto way to evaluate a product's ability to...
Leading Mortgage Financier Secures Move to the Cloud With Illumio
As a top lender focused on getting people into homes and keeping ransomware out of its IT environments,...
A Guide for SMBs: Can I really become 'less hackable'?
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners:...
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.