@JHortonIP Profile picture

Jason Horton

@JHortonIP

Father, husband, fisherman, tech enthusiast, and sometimes golfer. All opinions are my own.

Joined January 2014
Similar User
Dallas Radcliffe photo

@GartnerMatchMkr

tomaustin photo

@tomaustin

Megamax Solar  photo

@Megamaxsolar

Todd Berkowitz photo

@toddberkowitz

Sarah McCurdy photo

@smacplus3

Pinned

#ProofpointDiscovery Hands-On Lab | March 8 | Dallas Join us for an interactive workshop and get an exclusive hands-on experience with Proofpoint. Register here: go.proofpoint.com/ProofpointDisc…

Tweet Image 1

Proofpoint's threat researchers uncover ClickFix threat tricking users into running malicious PowerShell commands. thecyberwire.com/newsletters/da…


Gartner’s latest report helps #infosec pros navigate licensing complexities. Grab the reprint here ow.ly/XoRx50TX8aG. #Proofpoint

Tweet Image 1

When a global manufacturing company was ready to switch from siloed, independent point solutions to an integrated cybersecurity framework, it turned to @Proofpoint Read why our comprehensive #HumanCentricSecurity strategy rises above other vendors. ow.ly/aVTa50TWE6g

Tweet Image 1

#Proofpoint announces intent to acquire #Normalyze, adding comprehensive visibility and control of data posture (#DSPM) to identify and classify data, resolve compliance issues, and remediate cybersecurity risks at the speed of business. bit.ly/3UD6YNJ


Howard Holton sits down with Brian Reed @Proofpoint for this episode of Discovering Disruptions in Tech to discuss the adversary mindset and how best to reduce identity and cybersecurity risk. bit.ly/40wJ8H2


EU Network and Information Security (NIS2) Directive is officially in effect. See Carl Leonard's take on the powers granted to authorities under the directive. #Proofpoint #infosec bit.ly/4hrhh15


Blogger BEWARE! Fake WordPress plugins used to execute malicious code and steal sensitive data. 6,000 sites were hit in a single day last month and more than 23K have been impacted over the last year.. via @DarkReading #Proofpoint bit.ly/4e9dbYk


Deception is critical to hackers, but it can also be weaponized against them. Infosec experts, including Daniel Blackford of @Proofpoint, explore the use of honeypots and other deceptions to disrupt their ability to move laterally. bit.ly/4fnhVuH


#Latrodectus (aka BlackWidow, IceNova, Lotus) increasingly used by threat actors to establish backdoors, deploy malware, and exfil data from private sector orgs in the US. via @CSOonline #Proofpoint #infosec #threatintel bit.ly/4flNaWP


Reminder: Join @Proofpoint today for a look at #finserv's unique data protection challenges and how to modernize your insider risk program. #infosec bit.ly/4eKHyFX

Tweet Image 1

Joshua Miller @Proofpoint joined The Cyberwire's Research Saturday podcast to discuss recent activity by Iranian threat actor #TA453 targeting a prominent Jewish figure with a fake podcast interview invite. #infosec #CharmingKitten bit.ly/3BXitsz


Proofpoint's Certified Phishing Specialist course is now available on-demand. ow.ly/LqM550TGh8S Explore the sophisticated #phishing threat landscape and gather practical strategies to protect your organization. #HumanCentricSecurity #infosec

Tweet Image 1

Can't wait to see everyone at Proofpoint Protect 2024 next week! If you still need to register, let me know. ow.ly/jPSh50TGg90 #HumanCentricSecurity #Proofpoint #infosec

Tweet Image 1

Safeguarding schools and libraries from #ransomware and malicious #emailthreats more feasible, thanks to the E-Rate Cybersecurity Pilot Program. See what you need to know. @Proofpoint bit.ly/4ePca8S


Attackers are actively targeting a severe remote code execution Zimbra vulnerability. The bug observed by @Proofpoint beginning Sept. 28 gives attackers a way to run arbitrary code on affected servers and take control of them. bit.ly/4gUQDgW


GenAI in the workplace is a good thing, until it isn't. See how @Proofpoint is helping customers reduce cyber risk by enforcing acceptable use policies. ow.ly/LVuq50TuJ30

Tweet Image 1

According to the latest Ponemon and @Proofpoint survey, 89% of healthcare organizations experience close to one cyber attack per week. More than half (53%) said they lack the in-house expertise necessary to address the threat. @IBMSecurity #infosec ibm.co/3Y5cA5g


Come mid-October, EU companies must adhere to strict new #cybersecurity regulations under the NIS 2 directive. Carl Leonard @Proofpoint shares how these new requirements could impact industry #collaboration. cnb.cx/4evtvE8


Threat Actors target #3PL companies with cunning new #BEC attack – quietly inserting themselves into existing email chains. #Proofpoint #DarkReading bit.ly/3N6kG7r


Loading...

Something went wrong.


Something went wrong.