Turning the Tables

Even before this decade’s pandemic-fueled migration to remote and hybrid work, cyber criminals had shifted their focus away from infrastructure and toward people. More than ever, attacks seek to exploit human vulnerabilities, not just technical flaws. In most cases, they do it through email—a still-ubiquitous communications platform that was never built with security in mind.

Provider: Proofpoint Ltd   |   Size: 3.21 MB   |   Language: English