Category: Forcepoint
Four ways to overcome common Cross Domain data transfer challenges
How to make your Cross Domain transfer solutions and vendor work for you to reduce design complexity, costs & compliance anxietyThe IT Forecast: Cloudy with a chance of hybrid
It’s easy to get so caught up in the fervor that is “The Cloud” and “Digital Transformation” that we lose sight of the massive amount of code written over the […]Accelerating digital transformation with Secure SD-WAN
Digital Transformation has risen to the top of many enterprises’ and government agencies’ IT agendas. While it is frequently being used as a rationale for almost any initiative, most Digital […]Conference RISK 2019 coming for the first time to Bosnia and Herzegovina on October 8th 2019!
Reserve the date, as on October 8th 2019 the critically acclaimed information security conference RISK is coming to 5-star Hotel Hills Sarajevo in the capital city of Bosnia and Herzegovina! […]RISK 2019 Serbia – Recap video and all VoD from presentations
RISK 2019 Serbia took place on the 29th of May 2019 at the Radisson Collection Old Mill Belgrade hotel, where IT security specialists could meet, network, educate and of course, […]Should non-EMV transactions be phased out completely? An analysis of TinyPOS
For the last year Forcepoint X-Labs has been collecting samples of Point-of-Sale (POS) malware that stood out for their hand-crafted nature, were written in assembly code and were very small in size (2-7kB). In this blog we shall examine theTop 3 worrisome risks for organizations moving to the cloud
Recently we heard the news of sensitive data getting exposed from online filesharing accounts. It was not surprising and I’m sure majority of my colleagues in cybersecurity were not surprised […]RISK 2019 Serbia Preliminary Agenda Published!
We have just published the preliminary agenda for conference RISK 2019 Serbia, which will take place on May 29th 2019 at Radisson Collection Hotel, Old Mill Belgrade, Serbia. Attend presentations […]Beyond buzzwords – what cognitive science means to cybersecurity
Artificial Intelligence, Neural Networks, Cognitive Computing, and Machine Learning are all buzzwords applied to cybersecurity. But what do they actually mean? Are marketing departments simply re-using cognitive science terms to createAttacking the internal network from the public Internet using a browser as a proxy
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a browser will by default have access to localhostLoad More