Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...

Forcepoint Focuses on Relevance and Importance of Zero Trust Today

The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies ...

IBM Security: The Critical Solution for a World at Risk

I started in tech working for IBM and what makes the company unique is not its age—over 100 years—but the fact that it has since the beginning of when I got to ...

Brand impersonation attacks targeting SMB organizations

| | Security Awareness
Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers ...

More Effective Security Awareness: 3 Tips for NCSAM

It’s often said that humans are the weakest link in cybersecurity. Indeed, I’d have a hard time arguing that a computer that was sealed in a box, untouched by human hand, poses ...

How to avoid getting locked out of your own account with multi-factor authentication

| | Security Awareness
Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond ...
How to find weak passwords in your organization’s Active Directory

How to find weak passwords in your organization’s Active Directory

| | Security Awareness
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There ...
How hackers use CAPTCHA to evade automated detection

How hackers use CAPTCHA to evade automated detection

| | Security Awareness
Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of ...
Securing an Agile and Hybrid Workforce

Securing an Agile and Hybrid Workforce

Guest article by Andrea Babbs, UK General Manager, VIPRE2020 has forced businesses to revise many of their operations. One significant transition being the shift to a remote working model, for which many were ...

The State of Ransomware 2020: Key findings from Sophos & Malwarebytes

| | Security Awareness
Introduction Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise entities, as many organizations found themselves in ...