Cloudmark is now part of Proofpoint. Learn More

About Proofpoint

Spear Phishing: Not Just For Finance

Phishing, and particularly spear phishing, may be low tech, but it remains one of the most potent tools in the cyber criminal’s toolbox. In the past it has usually been used for financial crimes, along with some industrial and national espionage, but there is an alarming increase in attacks aimed at more general intelligence gathering. […]

How The Clinton Campaign’s Emails Were Hacked, And How They Might Have Prevented The Attack

Wikileaks is currently in the process of releasing thousands of emails stolen from the account of John Podesta, the Chairman of Hillary Clinton’s election campaign. Two of these contain a forwarded email that has been reported to be the original phishing attack that compromised the account. Let’s take a look at how the Clinton campaign […]

The State of Mobile Messaging Security

Mobile Application-to-person (A2P) messaging accounted for 1.38 trillion mobile messages last year, according to Mobilesquared; this market continues to grow.  Now more than ever is the time to think about how to ensure deliverability in the A2P cloud message space and how to prevent brand erosion or declines in quality of service due to abuse. Tomorrow we […]

A Proportional Response to Email Hacking

One of the significant issues in the current US Presidential election campaign has been the use and abuse of email. Both Hillary Clinton’s use of a private email server for government business while she was Secretary of State, and the allegation that the Russian government has been hacking Democratic National Committee and Clinton campaign emails […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2019 Cloudmark, Inc.