|Day Low/High||85.66 / 88.00|
|52 Wk Low/High||35.55 / 75.46|
Wednesday's downgrades of Coca-Cola and PepsiCo are in focus.
Highly personalized, targeted cyberattacks focus on exploiting people, not just their technology
Most cybersecurity stocks, like Palo Alto Networks, have struggled this year. But not Proofpoint, Cramer noted.
He noted that many of the attacks you are seeing are because of computers are still using Windows XP.
Shares of many cybersecurity companies were already up strongly over the last 12 months.
Cybersecurity companies benefit from spread of ransomware attack, but can they last?
Cybersecurity companies benefit from spread of ransomware attack; can they last?
FireEye, Proofpoint, Cisco, Symantec and other security providers all closed higher Monday.
Jim Cramer says investors are migrating toward sectors likely to have the biggest upside in the second half.
Industrials try to fit through narrow openings.
Just when you thought it was safe to start up Windows, new versions of the ransomware have surfaced.
Email phishing remains the "delivery mode of choice" for ransomware.
Recent earnings reports from IBM, Intel and others suggest cloud infrastructure demand is still taking a heavy toll on IT hardware sales. That is, outside of one market.
Cyber security company's shares are coming to a decision point.
Jim Cramer looks at how the French elections are smacking the U.S stock markets. Plus, he has the week-ahead game plan for oil and stocks.
These heavily shorted stocks could get squeezed sharply higher if they report positive earnings this week.
Business email compromise attacks jumped 45% in the fourth quarter, cyber security shop Proofpoint reports.
While Goldman Sachs analysts may be warming up to FireEye, Jim Cramer is sticking with Cisco.
Here are Thursday's top research calls, including new coverage of Alibaba, a downgrade for Dollar General and upgrades for FireEye and Kroger.
Cybersecurity leader Proofpoint enhances its comprehensive multi-layer BEC protection with integrated Email Fraud Defense authentication
In a bring-your-own-device world, many corporate networks welcome their employees' iPhones and Android phones --and their vulnerabilities.
Cybersecurity leader recognized for email security innovation, including enhanced business email compromise (BEC) protection, coupled with regulatory compliance excellence