The digital transformation ushered in a new era, but a more profound revolution is upon us: the AI Transformation. Artificial intelligence is rapidly reshaping entire industries, and data security is no exception.
It’s common knowledge by now that cybersecurity is a critical concern for all businesses. But for public companies, the stakes are especially high. Recognizing this fact, the U.S. Securities and Exchange Commission (SEC) has put the SEC…
Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.
The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory…
Phishing attacks have evolved into increasingly sophisticated schemes designed to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails that masquerade as PDF viewer…
Compare data retention to the way you store personal belongings that you aren’t using at the moment. The easiest practice is to throw everything into a garage or attic and hold onto it in case you need it later. But if you’re not diligent…
The mobile phone reinvented – well, pretty much everything we do. And though we’re still in its early days, it’s looking as if Artificial Intelligence (AI) will have a similar widespread impact.
Banking Trojans have become increasingly prevalent in recent times. Today, we’ll delve into one particular campaign. This malware, commonly known as Metamorfo , spreads through malspam campaigns, enticing users to click on HTML attachments…
We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one…
One of the primary propagation methods for Darkgate is phishing emails. By hijacking email accounts, distributing malicious attachment and it propagate itself to a wider network of potential victims. Darkgate uses some of the most common…
In a world where technology constantly evolves, Forcepoint is pleased to announce a significant stride in the delivery of Data Security Everywhere. With people working from anywhere and data that’s everywhere, we are now extending support…
Unprotected email remains a significant vulnerability for organizations of all sizes, with studies revealing that over 50% of data breaches starts from email . In today's digital landscape, where sensitive information is constantly…
Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.
Generative AI is at the forefront of everyone’s minds, it comes up in the conversations I am having on a daily basis. Like it or not, generative AI has become a mainstream technology to the point where it’s guaranteed to be incorporated…
One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive…
Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working…
Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless…
Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top…
Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.
Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.
Sometimes it's hard to even image what “cloud security” looks like. The concept of the cloud suggests something without definite shape or stable boundaries. So how do you protect data in the cloud if you can’t lock it away somewhere next…
For CISOs and other security professionals, securing an organization’s critical data is vital. Using data policy controls to protect regulated data, confidential information and other critical files is an important component of a robust…
Forcepoint, the Global Leader in Data Lost Prevention (DLP), is excited that CRN has recognized Forcepoint with a 5 Star Rating in its 2024 CRN Partner Program Guide. This designation is exclusive. CRN only awards this designation to…
Have you been following our Spotlight On video series recently? Clocking in at under five minutes apiece, these bite-size instructional reels shed light on the shifting cybersecurity landscape and explain how Forcepoint products block…
"Change is the only constant," a timeless observation by the Greek philosopher Heraclitus, resonates particularly in today’s modern digital landscape. As the workforce navigates among fully remote, transitioning back to the office or…
Forcepoint’s Data Security Everywhere approach lets you establish a unified set of policies to protect data consistently across many different channels. The web is an important one.
Forrester recently published The Forrester Wave™: Security Service Edge Solutions, Q1 2024 report . We’re honored and excited to be named a ‘Leader’ in the report. Here’s what they said about our SSE platform, Forcepoint ONE:
We are thrilled to announce we have been honored with the distinction of being recognized as a Gartner Peer Insights ™ Customers’ Choice for SD-WAN . We believe this acknowledgement highlights our commitment to delivering exceptional…
Forcepoint is honored to again be named a "Top Player" in the Radicati Group’s Data Loss Prevention Market Quadrant 2024 report. This report evaluates the breadth and depth of each vendor’s DLP functionality. They also evaluate vendors…
Today data is everywhere – on our laptops, phones, tablets and in the cloud. And with the acceleration of cloud adoption due to distributed workforces, more and more data is being stored outside of the traditional corporate network. This…