Category: Forcepoint
“Tiny Crimes” – the WFH behaviors that invite cyber risk (Australian Survey)
Here’s a condensed version of the conversation: Dr Margaret Cunningham, Principal Research Scientist at Forcepoint, and Nick Savvides, Forcepoint’s Senior Director of Strategic Business, APAC, discussed how employee stress could […]Bringing Government-Strength Data Protection to a Commercial Operational Environment
You can read more about cross-domain solutions and Forcepoint Data Guard in part one of our blog series. However, in today’s integrated digital world, the applications for these cross-domain solutions […]New Approaches for ‘Air Gapped’ IT and OT Environments for Critical Infrastructure
In this new world of interconnected systems, critical infrastructure organizations benefit from a multitude of Internet of Things devices with all the additional functionality they bring, and valuable, bi-directional data […]Transforming the Science of Security with Human Factors
My colleague Dr. Calvin Nobles, department chair and associate professor of information and management at the Illinois Tech College of Computing, defines human factors engineering as “a scientific approach to […]Forcepoint NGFW MITRE ATT&CK simulation
In this scenario, an admin researches an issue, finds a potential solution on a forum. The solution provides a download link to PuTTY. Unfortunately, this file points to a malicious […]EO 14028 is “right on time,” but challenges remain in race to develop software
The Cybersecurity Executive Order dictated publishing guidance outlining security measures for critical software, on Day 60 (see highlighted section in the image below), including vendor testing of source code – […]Can Cybersecurity Be Robust Without Being Rigid?
Decisions around cybersecurity can be stressful, if not plain scary. The stakes are always high, and it seems like there’s a headline related to a breach or ransomware every other […]Boards of Directors: Cyber Risk is the Cost of Doing Business
Principles for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they play in an organization’s cyber resilience strategy. […]Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASE
CDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to new, sanitized file. Through this process, malicious content is […]Transforming from “Zero” to “Hero” with Data-first SASE
Many organizations are replacing the short-term workarounds implemented during the pandemic to keep people safe, yet productive. Today, protecting the enterprise edge is difficult, or some would argue, impossible. With […]Load More