Category: Forcepoint
Zero Trust and SASE: Teaming Up to Stop Threats
But back here in the real world, we’re seeing several dramatic shifts in the cybersecurity industry play out. As people fled their offices last year, a significant number of attackers […]Forcepoint Honored to be a Finalist in Two Microsoft Security 20/20 Award Categories
It’s hard to believe that just over a year ago, the Forcepoint team was focused on delivering Azure Sentinel integrations across our NGFW, DLP and CASB offerings. Back then, cloud […]“Tiny Crimes” – How Minor Mistakes When Remote Working Could Lead to Major Cybersecurity Breaches
As a leader in user and data protection, Forcepoint knows that understanding users’ behavior is critical for protecting against emerging cybersecurity risks. This research explores the impact of remote work […]See Zero Trust in Action at the Zero Trust Demo Forum
The Zero Trust Demo Forum represents a great place to see Zero Trust solutions in action and to learn about a variety of aspects to consider for Zero Trust. We’ll dive […]Advancements in Invoicing – A highly sophisticated way to distribute ZLoader
Spam campaigns using this new distribution chain first started to appear in early February 2021. The content of the emails follow the long-standing simplistic style of invoicing scams. While the […]EMEA Perspective – Building Resilient Cybersecurity
It’s no secret that hackers outnumber the cybersecurity professionals trying to stop them. And that gap will likely continue to widen. But there’s steps organisations can take now. Building resilience […]Help me trojanize you – Microsoft Compiled HTML Help is back for another round
In the past few weeks, malicious spam campaigns have surfaced that include attachments of varying archive types. Whilst the archives were mostly either ZIP or RAR format, they have been […]Why Zero Trust is Needed in the Real World Too
A real-word example of why Zero Trust matters But the need for Zero Trust doesn’t stop at the cyber edge. With so many processes in our daily lives becoming digitized, how […]Understanding Insider Threat Before the Breach
Two recent examples of insider threat show how incorrect information can lead to bad decisions. In one, a data scientist who previously tracked COVID-19 cases for Florida was recently accused […]How Cybersecurity Changed in 2020 and What it Means for 2021
Now, as much of the world continues working from home, that means company data, networks and employees themselves are vulnerable to multiple pervasive and expanding threats. As the “new normal” […]Load More