Category: Forcepoint
SASE—How to separate the good, the bad, and the ugly
SASE provides a key path to Zero Trust Yet due to this popularity so many tools and services have applied the SASE moniker to themselves that everything seems to be […]New Solutions to the Evolving Definition of Insider Risks
In some cases, these issues have created significant workplace challenges. Look no further than the pushback some companies have received from reversing remote work plans, or the tenuous position Twitter […]2023 State of Security Report: Strive for Simplicity
But for all the benefits brought to the field, companies didn’t escape the downsides. Now, they’re striving to simplify security. A flurry of change saw organizations shift their approach to […]Hackers Exploit PayPal Invoicing Bug to Launch Advanced Phishing Attacks
With my initial scepticism high, I decided to investigate to see if someone had managed to spoof the domain of PayPal.com. PayPal invoicing is a feature developed to ease the […]Forcepoint Security News Returns
CISA adds Apple zero-day, Cisco and Gigabyte bugs to exploited vulnerabilities list Here are some top recent security stories getting our attention: White House announces 100-day sprint on chemical sector […]Insider Threat Awareness Month: A To The Point Cybersecurity Podcast Recap
If your organization is looking to better protect itself from insider threats, we invite you to listen to these episodes, or better yet, subscribe to the podcast. Last month, in honor […]To Make Your Hybrid Workforce More Productive, Focus on Application Access and Performance
Spot and deal with application performance issues before they become problems To help you with this, Forcepoint is bringing out a series of product updates geared toward improving access to […]The Increasingly Complex Threat Landscape Must be Fought with Simplicity
Indeed, new research from Forcepoint found 65% of U.K. and U.S. CNI organizations have fallen victim to a cyberattack and 57% to a ransomware attack in the last 12 months […]CISA Directive: Federal Agencies Must Improve Cybersecurity Asset Visibility and Vulnerability Detection
CISA states the directive supports many other mandates and guidance that has previously been established, including the Executive Order 14028 on Improving the Nation’s Cybersecurity (specifically Sec. 7: Improving Detection […]Inside the James Webb Attack Image
Appending data to an image is a well-known way of hiding malware. In this case, the executable data is Base64 encoded and surrounded by markers indicating it is a certificate. […]Load More