Check, Please! Adding up the Costs of a Financial Data Breach

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...

Embracing SaaS Productivity Without Sacrificing Security

We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital ...

Protecting Digital Democracy

With Election Day over, Americans await the final vote counts. As this contentious race coming to a close, securing digital data is now more critical to the democratic process than ever before ...

Tackling the Cybersecurity Resource Problem

Cybersecurity has always been important, but in today’s completely-digital world, it may be safe to say that it matters even more. As the digital footprint and connectivity increases, so do the security ...

Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms

The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...

Chris Eng Talks about the State of Software Security Report

TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This ...

Secure Your Digital Life During Cybersecurity Awareness Month

For many, the term cybersecurity conjures images of competing hackers hunched over their laptops, furiously typing in dimly lit rooms until one of them shouts, “I’m in!” At which point, missile defense ...
We are the Defenders. The first to your fight.

Cybereason Backs Its Protection with $1 Million Breach Protection Warranty

Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver ...

Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...

Forcepoint Focuses on Relevance and Importance of Zero Trust Today

The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies ...