Category: Forcepoint
(Un)expected Lessons in Cybersecurity – Business and Security Strategies for The Post-Pandemic Unbound Enterprise
With more than two decades in IT security, I’ve seen a lot. After all, I’ve been on record predicting all sorts of things that come true (or pretty close!). The […]Federal Agencies Like DHS Look Ahead to Strengthening Security and Reliability of Federal Information Systems
For an agency like the Department of Homeland Security (DHS), which plays a leadership role across government in securing our country’s cyberspace, assessing these new and evolving cybersecurity risks and […]Taking Remote Browser Isolation (RBI) to the next level in SASE
Today, we announced that Forcepoint has acquired Cyberinc, a true innovator in the remote browser isolation industry. Their unique Isla Smart Isolation technology is context-aware, enabling the isolation to be […]5 Steps to SASE: Protecting Remote Workers, a discussion with Dr. Chase Cunningham
To shed some light on this crucial topic, I recently sat down with several experts to talk about five of the most common steps that businesses and government agencies tell […]Q&A with Carahsoft: Shoring up cybersecurity in the face of changing threats and tightening regulations
To make sense of these issues and gain insights into developing trends, I caught up with Brian O’Donnell, vice president of sales at Carahsoft. Carahsoft is a Forcepoint partner and […]A Look Back at To The Point Cybersecurity Podcast Episodes in Q1
Jared Quance, an insider threat program manager for the U.S. government, shared his take on the role privileged users play, and how Sunburst has affected insider threat programs. Insider Threat […]Zero Trust: A Smarter Approach to Security
People and wherever they access apps and data represent the new perimeter. Zero Trust is a security framework that can help safeguard the people perimeter from a growing range of […]Keeping up with a Hybrid Workforce Requires Fast Tracking SASE in 2021
Today, organizations must be able to provide fast, reliable, and secure access to their employees no matter where they’re located or what devices they’re using. Doing so requires a change […]How Three Forcepoint Customers Protect Their Data While Enabling Productivity
Forcepoint Customer Stories Why must we accept that breaches are inevitable? While traditional data protection provides visibility into your employee’s data activity, it lacks the context behind user interactions. Systems […]EMEA Perspective – Build Trust like a Bank
The 2020 pandemic and cloud adoption have at least one thing in common – both have led to an increased digital surface of exposure and added difficulty in keeping track […]Load More