English

www.forcepoint.com

Friday, Jul 12

19

ShadowRoot Ransomware Targeting Turkish Businesses

www.forcepoint.com

Our X-Labs team’s research seems to have discovered and identified basic ransomware targeting Turkish businesses. The attack vector initiates through a PDF attachment disseminated via suspicious emails originating from the "internet[.]ru"…

Wednesday, Jul 10

The Real Deal Behind Forcepoint's AI Mesh

www.forcepoint.com

In today's rapidly evolving world of data security technology, the term "AI-powered" is everywhere. However, this label often serves as a form of AI washing – seeking to make a product seem more innovative or advanced than it actually is.…

Friday, Jul 5

15

Police shut down 600 Cobalt Strike servers, Cloudflare tool to stop AI bots, Infostealer malware logs used to identify CSAM website members and more

www.forcepoint.com

Note from Lionel: It’s been a minute since I published an issue of Forcepoint’s Security News You Can Use. I’m bringing this bi-weekly series back for two reasons: 1) Some Forcepoint employees asked me to revive it, and 2) For the second…

Wednesday, Jul 3

17

Six Remote Work Security Best Practices to Safeguard Data

www.forcepoint.com

The shift to remote work represents one of the biggest changes to how employes get work done in the last decade. While the transition has given employees more flexibility in how they work, it has also created lots of security…

Monday, Jul 1

16

Securing Copilot with Forcepoint DSPM

www.forcepoint.com

Is your organization’s data safe with Microsoft Copilot ? This is a question that has been echoing in the corridors of businesses worldwide. Microsoft Copilot, a revolutionary AI-powered assistant, has been transforming the business…

Tuesday, Jun 25

Forcepoint DSPM Orchestration Automates Data Governance

www.forcepoint.com

In today's data-driven world, organizations grapple with a constant influx of information. This unprecedented volume of data presents both opportunities and challenges. While valuable insights lie within, the sheer volume makes it…

Monday, Jun 24

URL shortener in a Microsoft Word file that leads to Remcos RAT

www.forcepoint.com

Note: Recently, in our X-Labs telemetry data, we found a Word doc (FAKTURA.docx) that deploys the Remcos Remote Access Trojan (RAT.) During the course of our analysis, we realized that Cyfirma had completed a threat analysis in March 2024 …

Friday, Jun 21

20

What Does Data Security Automation Look Like in the Age of AI?

www.forcepoint.com

The role of automation in data security has traditionally been limited by the need for critical tasks to be performed, or at least supervised by, trained security professionals. The concept is getting flipped on its head with the…

Monday, Jun 17

15

Manny Rivelo and Karl Triebes Talk DSPM and Cloud DLP

www.forcepoint.com

A few weeks ago, we launched two new products—both designed to protect an organization’s data.

Monday, Jun 10

17

AI-Powered Accuracy in Forcepoint DSPM

www.forcepoint.com

The digital transformation ushered in a new era, but a more profound revolution is upon us: the AI Transformation. Artificial intelligence is rapidly reshaping entire industries, and data security is no exception.

Tuesday, Jun 4

19

How to Comply with the SEC Cybersecurity Disclosure Rules

www.forcepoint.com

It’s common knowledge by now that cybersecurity is a critical concern for all businesses. But for public companies, the stakes are especially high. Recognizing this fact, the U.S. Securities and Exchange Commission (SEC) has put the SEC…

Thursday, May 30

16

6 Types of DLP Solutions - and How to Pick the Right One

www.forcepoint.com

Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.

Tuesday, May 28

17

How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) Simplify Data Security

www.forcepoint.com

The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory…

Thursday, May 23

18

Beware of HTML Masquerading as PDF Viewer Login Pages

www.forcepoint.com

Phishing attacks have evolved into increasingly sophisticated schemes designed to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails that masquerade as PDF viewer…

Monday, May 20

16

Data Retention Policy Best Practices: A User’s Guide

www.forcepoint.com

Compare data retention to the way you store personal belongings that you aren’t using at the moment. The easiest practice is to throw everything into a garage or attic and hold onto it in case you need it later. But if you’re not diligent…

Friday, May 17

7 Examples of How AI is Improving Data Security

www.forcepoint.com

The mobile phone reinvented – well, pretty much everything we do. And though we’re still in its early days, it’s looking as if Artificial Intelligence (AI) will have a similar widespread impact.

Thursday, May 16

17

Exploring the Metamorfo Banking Trojan

www.forcepoint.com

Banking Trojans have become increasingly prevalent in recent times. Today, we’ll delve into one particular campaign. This malware, commonly known as Metamorfo , spreads through malspam campaigns, enticing users to click on HTML attachments…

Wednesday, May 15

15

The Importance of Data Posture and How to Evaluate It

www.forcepoint.com

We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one…

Tuesday, May 14

From Document to Script: Insides of Darkgate's Campaign

www.forcepoint.com

One of the primary propagation methods for Darkgate is phishing emails. By hijacking email accounts, distributing malicious attachment and it propagate itself to a wider network of potential victims. Darkgate uses some of the most common…

Thursday, May 9

16

Forcepoint Welcomes ARM-Based Devices: Safeguarding Your Digital Evolution

www.forcepoint.com

In a world where technology constantly evolves, Forcepoint is pleased to announce a significant stride in the delivery of Data Security Everywhere. With people working from anywhere and data that’s everywhere, we are now extending support…

Wednesday, May 8

18

Forcepoint Elevates Email Security with Forcepoint ONE Data Security for Email

www.forcepoint.com

Unprotected email remains a significant vulnerability for organizations of all sizes, with studies revealing that over 50% of data breaches starts from email . In today's digital landscape, where sensitive information is constantly…

Tuesday, May 7

14

Protecting Data Everywhere from the Cloud with Forcepoint ONE Data Security

www.forcepoint.com

Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.

Wednesday, May 1

16

Is Your Organization Ready for a Copilot for Microsoft 365 Rollout?

www.forcepoint.com

Generative AI is at the forefront of everyone’s minds, it comes up in the conversations I am having on a daily basis. Like it or not, generative AI has become a mainstream technology to the point where it’s guaranteed to be incorporated…

Tuesday, Apr 30

DSPM vs. CSPM: What Are the Differences and How to Decide?

www.forcepoint.com

One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive…

Tuesday, Apr 23

Forcepoint Brings AI-Powered DSPM to Customers

www.forcepoint.com

Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working…

Monday, Apr 22

17

Data Security Everywhere: Tame Dark Data with Discovery and Classification

www.forcepoint.com

Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless…

Friday, Apr 19

16

Forcepoint Introduces New Partner Enablement Framework

www.forcepoint.com

Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top…

Tuesday, Apr 16

9 Data Security Best Practices to Prevent Breaches

www.forcepoint.com

Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.

Monday, Apr 15

18

We Asked People if They Used AI Tools with Security in Mind

www.forcepoint.com

Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.

Wednesday, Apr 10

16

11 Cloud Security Best Practices Every Business Can Use

www.forcepoint.com

Sometimes it's hard to even image what “cloud security” looks like. The concept of the cloud suggests something without definite shape or stable boundaries. So how do you protect data in the cloud if you can’t lock it away somewhere next…