Cloud Security
Defending Ukraine: Early Lessons from the Cyber War
The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine,...
5 Best Practices for Securing Modern Web Applications and APIs
Web applications are nothing new. Neither is web application security. Many businesses have been building...
Microsoft Digital Defense Report
Over the past year the world has borne witness to a burgeoning cybercrime economy and the rapid rise...
Open Channels, Hidden Threats
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and...
Your Path to Zero Trust
In a business world without perimeters and dominated by remote work, finding a balance between easy collaboration...
The Shared Responsibility Model Explained
In a cloud environment, your service provider takes on a share of many operational burdens, including...
Alphabet Soup: Making Sense of XDR, EDR, NDR, and SIEM
XDR, EDR, NDR, and SIEM. They are among the most prominent acronyms in cybersecurity. But what do they...
The Increase in Mobile Wallet Adoption Impacts the Need for Security
The use of mobile payments is on the rise! According to industry data, mobile wallets are used by more...
Raising the Bar for Web App and API Security
Most Web Application and API Security Isn't Enough Securing the web applications and APIs that underpin...
Navigating the Cloud: Key factors for long term success
The cloud is not only here to stay, its impact is growing. As cloud-based solutions and capabilities...
The Five Nastiest Security Mistakes Exposing Public Cloud Infrastructure
Public cloud infrastructure has become a critical asset to enterprises that compete on innovation. Protecting...
The Top Questions to Ask in Your SASE RFP
Moving to a cloud-delivered architecture can be daunting. It is essential to find a SASE provider who...
Proofpoint Information and Cloud Security Platform
The Proofpoint Information and Cloud Security platform combines many of our products to address secure...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
