Security Awareness
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...
Forcepoint Focuses on Relevance and Importance of Zero Trust Today
The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies ...
IBM Security: The Critical Solution for a World at Risk
I started in tech working for IBM and what makes the company unique is not its age—over 100 years—but the fact that it has since the beginning of when I got to ...
Brand impersonation attacks targeting SMB organizations
Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers ...
More Effective Security Awareness: 3 Tips for NCSAM
It’s often said that humans are the weakest link in cybersecurity. Indeed, I’d have a hard time arguing that a computer that was sealed in a box, untouched by human hand, poses ...
How to avoid getting locked out of your own account with multi-factor authentication
Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond ...
How to find weak passwords in your organization’s Active Directory
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There ...
How hackers use CAPTCHA to evade automated detection
Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of ...
Securing an Agile and Hybrid Workforce
Guest article by Andrea Babbs, UK General Manager, VIPRE2020 has forced businesses to revise many of their operations. One significant transition being the shift to a remote working model, for which many were ...
The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
Introduction Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise entities, as many organizations found themselves in ...
