Jason Horton
@JHortonIPFather, husband, fisherman, tech enthusiast, and sometimes golfer. All opinions are my own.
Similar User
@GartnerMatchMkr
@tomaustin
@Megamaxsolar
@toddberkowitz
@smacplus3
#ProofpointDiscovery Hands-On Lab | March 8 | Dallas Join us for an interactive workshop and get an exclusive hands-on experience with Proofpoint. Register here: go.proofpoint.com/ProofpointDisc…
Proofpoint's threat researchers uncover ClickFix threat tricking users into running malicious PowerShell commands. thecyberwire.com/newsletters/da…
Gartner’s latest report helps #infosec pros navigate licensing complexities. Grab the reprint here ow.ly/XoRx50TX8aG. #Proofpoint
When a global manufacturing company was ready to switch from siloed, independent point solutions to an integrated cybersecurity framework, it turned to @Proofpoint Read why our comprehensive #HumanCentricSecurity strategy rises above other vendors. ow.ly/aVTa50TWE6g
#Proofpoint announces intent to acquire #Normalyze, adding comprehensive visibility and control of data posture (#DSPM) to identify and classify data, resolve compliance issues, and remediate cybersecurity risks at the speed of business. bit.ly/3UD6YNJ
Howard Holton sits down with Brian Reed @Proofpoint for this episode of Discovering Disruptions in Tech to discuss the adversary mindset and how best to reduce identity and cybersecurity risk. bit.ly/40wJ8H2
EU Network and Information Security (NIS2) Directive is officially in effect. See Carl Leonard's take on the powers granted to authorities under the directive. #Proofpoint #infosec bit.ly/4hrhh15
Blogger BEWARE! Fake WordPress plugins used to execute malicious code and steal sensitive data. 6,000 sites were hit in a single day last month and more than 23K have been impacted over the last year.. via @DarkReading #Proofpoint bit.ly/4e9dbYk
Deception is critical to hackers, but it can also be weaponized against them. Infosec experts, including Daniel Blackford of @Proofpoint, explore the use of honeypots and other deceptions to disrupt their ability to move laterally. bit.ly/4fnhVuH
Voldemort malware observed in August by #Proofpoint attributed to China-state-sponsored actor and #BrassTyphoon. Read more @techday_UK #infosec #threatinsight #espionage bit.ly/3YoEGaH
#Latrodectus (aka BlackWidow, IceNova, Lotus) increasingly used by threat actors to establish backdoors, deploy malware, and exfil data from private sector orgs in the US. via @CSOonline #Proofpoint #infosec #threatintel bit.ly/4flNaWP
Reminder: Join @Proofpoint today for a look at #finserv's unique data protection challenges and how to modernize your insider risk program. #infosec bit.ly/4eKHyFX
Joshua Miller @Proofpoint joined The Cyberwire's Research Saturday podcast to discuss recent activity by Iranian threat actor #TA453 targeting a prominent Jewish figure with a fake podcast interview invite. #infosec #CharmingKitten bit.ly/3BXitsz
Proofpoint's Certified Phishing Specialist course is now available on-demand. ow.ly/LqM550TGh8S Explore the sophisticated #phishing threat landscape and gather practical strategies to protect your organization. #HumanCentricSecurity #infosec
Can't wait to see everyone at Proofpoint Protect 2024 next week! If you still need to register, let me know. ow.ly/jPSh50TGg90 #HumanCentricSecurity #Proofpoint #infosec
Safeguarding schools and libraries from #ransomware and malicious #emailthreats more feasible, thanks to the E-Rate Cybersecurity Pilot Program. See what you need to know. @Proofpoint bit.ly/4ePca8S
Attackers are actively targeting a severe remote code execution Zimbra vulnerability. The bug observed by @Proofpoint beginning Sept. 28 gives attackers a way to run arbitrary code on affected servers and take control of them. bit.ly/4gUQDgW
GenAI in the workplace is a good thing, until it isn't. See how @Proofpoint is helping customers reduce cyber risk by enforcing acceptable use policies. ow.ly/LVuq50TuJ30
According to the latest Ponemon and @Proofpoint survey, 89% of healthcare organizations experience close to one cyber attack per week. More than half (53%) said they lack the in-house expertise necessary to address the threat. @IBMSecurity #infosec ibm.co/3Y5cA5g
Come mid-October, EU companies must adhere to strict new #cybersecurity regulations under the NIS 2 directive. Carl Leonard @Proofpoint shares how these new requirements could impact industry #collaboration. cnb.cx/4evtvE8
Threat Actors target #3PL companies with cunning new #BEC attack – quietly inserting themselves into existing email chains. #Proofpoint #DarkReading bit.ly/3N6kG7r
United States Trends
- 1. Thanksgiving 1,58 Mn posts
- 2. $TURKEY 2.568 posts
- 3. Thankful 302 B posts
- 4. #IDEGEN N/A
- 5. $CUTO 7.509 posts
- 6. #Gratitude 10,7 B posts
- 7. Kylie Minogue N/A
- 8. #Grateful 5.901 posts
- 9. Al Roker N/A
- 10. Optimus 25,1 B posts
- 11. Hoda 1.384 posts
- 12. The Fed 56,7 B posts
- 13. Feliz Día de Acción de Gracias 3.399 posts
- 14. Gobble Gobble 17,9 B posts
- 15. Go Lions 2.259 posts
- 16. Vindman 104 B posts
- 17. Ariana Madix N/A
- 18. Fight Song 1.465 posts
- 19. #GiveThanks 1.987 posts
- 20. Jimmy Fallon 1.577 posts
Something went wrong.
Something went wrong.