Today marks an important milestone in both the GenAI and security industries. Forcepoint is honored to be among the first security vendors to integrate with OpenAI’s ChatGPT Enterprise Compliance API. Forcepoint DSPM now uses this API to…
Our X-Labs team’s research seems to have discovered and identified basic ransomware targeting Turkish businesses. The attack vector initiates through a PDF attachment disseminated via suspicious emails originating from the "internet[.]ru"…
In today's rapidly evolving world of data security technology, the term "AI-powered" is everywhere. However, this label often serves as a form of AI washing – seeking to make a product seem more innovative or advanced than it actually is.…
Note from Lionel: It’s been a minute since I published an issue of Forcepoint’s Security News You Can Use. I’m bringing this bi-weekly series back for two reasons: 1) Some Forcepoint employees asked me to revive it, and 2) For the second…
The shift to remote work represents one of the biggest changes to how employes get work done in the last decade. While the transition has given employees more flexibility in how they work, it has also created lots of security…
Is your organization’s data safe with Microsoft Copilot ? This is a question that has been echoing in the corridors of businesses worldwide. Microsoft Copilot, a revolutionary AI-powered assistant, has been transforming the business…
In today's data-driven world, organizations grapple with a constant influx of information. This unprecedented volume of data presents both opportunities and challenges. While valuable insights lie within, the sheer volume makes it…
Note: Recently, in our X-Labs telemetry data, we found a Word doc (FAKTURA.docx) that deploys the Remcos Remote Access Trojan (RAT.) During the course of our analysis, we realized that Cyfirma had completed a threat analysis in March 2024 …
The role of automation in data security has traditionally been limited by the need for critical tasks to be performed, or at least supervised by, trained security professionals. The concept is getting flipped on its head with the…
The digital transformation ushered in a new era, but a more profound revolution is upon us: the AI Transformation. Artificial intelligence is rapidly reshaping entire industries, and data security is no exception.
It’s common knowledge by now that cybersecurity is a critical concern for all businesses. But for public companies, the stakes are especially high. Recognizing this fact, the U.S. Securities and Exchange Commission (SEC) has put the SEC…
Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.
The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory…
Phishing attacks have evolved into increasingly sophisticated schemes designed to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails that masquerade as PDF viewer…
Compare data retention to the way you store personal belongings that you aren’t using at the moment. The easiest practice is to throw everything into a garage or attic and hold onto it in case you need it later. But if you’re not diligent…
The mobile phone reinvented – well, pretty much everything we do. And though we’re still in its early days, it’s looking as if Artificial Intelligence (AI) will have a similar widespread impact.
Banking Trojans have become increasingly prevalent in recent times. Today, we’ll delve into one particular campaign. This malware, commonly known as Metamorfo , spreads through malspam campaigns, enticing users to click on HTML attachments…
We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one…
One of the primary propagation methods for Darkgate is phishing emails. By hijacking email accounts, distributing malicious attachment and it propagate itself to a wider network of potential victims. Darkgate uses some of the most common…
In a world where technology constantly evolves, Forcepoint is pleased to announce a significant stride in the delivery of Data Security Everywhere. With people working from anywhere and data that’s everywhere, we are now extending support…
Unprotected email remains a significant vulnerability for organizations of all sizes, with studies revealing that over 50% of data breaches starts from email . In today's digital landscape, where sensitive information is constantly…
Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.
Generative AI is at the forefront of everyone’s minds, it comes up in the conversations I am having on a daily basis. Like it or not, generative AI has become a mainstream technology to the point where it’s guaranteed to be incorporated…
One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive…
Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working…
Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless…
Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top…
Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.
Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.