Contact Us

1 (800) 723-1166 |

All Blogs

The news out today from Cisco about a massive breach of routers and storage devices – including notable infections in Ukraine – shows that hackers continue to attempt to penetrate the Information Technology (IT)/Operational Technology (OT) barrier. Common techniques like spear phishing and credential compromise, as well as what we’ve seen from past attacks like NotPetya, expose the requirement for basic defenses like proper segmentation and patching in the OT area. A strong identity tie-in... Read More

[Editor's note: This is the 2nd blog in a 3-part series exploding some of the myths surrounding SD-WAN. You can read Part I in the series here.]

Myth #2: SD-WAN takes the place of the internet

SD-WAN is hot and it’s generating a lot of hype. Some of the noise is valid, such as how SD-WAN can help distributed organizations use interactive cloud apps in a more productive and cost-effective way. Yet occasionally this gets misconstrued, creating confusion and distracting from SD-... Read More

Back in November we released our Security Predictions for 2018. Now, only six months on, we can uncover just how many of our predictions have come true already. While we’re pleased with our accuracy, the reality can be somewhat discouraging, as many of these predictions bring additional risk to businesses like yours.

The goal of our Security Predictions is to give you a better understanding of the risks your organisation faces, and how you can better defend against them... Read More

Since the leak of the Ursnif/Gozi source code about two years ago there have been multiple campaigns delivering either Ursnif or its ‘forks’ (e.g. GozNym). 

Banking malware is a lucrative business and it was more or less inevitable that a wider range of cybercriminals will take advantage of the opportunity to run their own campaigns, adding to the original code base as they went along. We’ve already discussed some earlier campaigns on this blog, but over the past several weeks we... Read More

On days such as Armed Forces Day (which is taking place this Saturday, May 19th) we pause to consciously give thanks to the men and women across the Department of Defense and reflect on the sacrifices and service they, and their families, make every day to ensure our freedoms and way of life. And to say Godspeed to those headed to serve, welcome home to those recently returned (with a special shout-out to those Forcepointers newly home or soon to be).

Speaking on behalf... Read More

Those who follow the security news could hardly have missed the release of the ‘EFAIL’ vulnerabilities this week. In brief, issues have been found with OpenPGP and S/MIME email encryption which can potentially expose the decrypted text of a message to attackers.

What are PGP and S/MIME?

The authors of the EFAIL paper cover this well, but ultimately email is a plaintext communication medium – much like the majority of pen and paper letters outside of spy films – and... Read More

While sitting above the ocean in a quiet, remote town in Portugal, fully connected into all of the resources I needed to get work done, I started thinking about how rapidly the networking landscape is changing. Now, more than ever before, it’s feasible for enterprises to use software and commodity internet connections to simultaneously improve their teams’ productivity while also saving money. As with many technologies, what started off as hype at the bleeding edge is maturing into... Read More

Low and slow data leaks can be challenging to detect, and leaks that contain critical data can have a substantially negative impact on an organization. These leaks can come in many forms. For example, users emailing small pieces of data over time to off-network accounts, or individuals printing out documents or placing them on removable media devices, and taking them to other locations.

Forcepoint has an advanced approach for detecting these leaks through its extensive libraries... Read More

Last week Twitter disclosed all of its 336 million user accounts were at risk because the passwords were stored on an unprotected log file. As a Twitter user, I promptly changed my password and in the process discovered that over the years I had linked my Twitter account to dozens of applications, many of which I don’t even use anymore (hello TweetDeck). That prompted me to clean up my Twitter act. And then I sat down with Forcepoint’s chief scientist, Richard Ford, to make sense... Read More

Web is often one of the first channels that IT administrators look to secure. For years, this has been achieved by installing a Secure Web Gateway (SWG) in the network’s perimeter, which would implement a scanning proxy.

The perimeter no longer exists. Not for IT services, and not for the users themselves. Employees today travel often – using their corporate issued or own devices on public Wi-Fi networks and other insecure situations. Protecting Web browsing only on corporate... Read More