menu

Contact Us

1 (800) 723-1166 |

All Blogs

Today, May 4th, I write this article to stress that we are just three weeks away from the date that General Data Protection Regulations (GDPR) will be enforced. I hope that organisations around the world are making their final preparations to be ready for the 25 May 2018 milestone in privacy legislation.

What better day, May the 4th, to take inspiration from Star Wars as we continue our GDPR journey.

“Ready are you? What know you of ready?”       -- Yoda to... Read More

Por Carl Leonard, Analista Principal de Seguridad de Forcepoint  

Comenzó la cuenta regresiva. En febrero de 2018 Google anunció que para julio de este año Chrome v68 identificaría a los sitios HTTP como “No Seguros”. Este esfuerzo de Google ha sido esperado por mucho tiempo a medida que la compañía y otros proveedores promueven conceptos como “la encripción predeterminada” o “HTTPs en todo lugar”. De hecho, revisamos las implicaciones de que la web se encamine hacia la... Read More

As the CIO of Forcepoint, I get exposed daily to vendors trying to sell me a multitude of technologies. Some come from across the country while others sit just a few offices away in the same building. While I have of course implemented many Forcepoint solutions, there is nothing compelling me to do so. I have the freedom to choose the technologies that work best for my environment and protect the company.

My CISO and I often have conversations around the types of technology we... Read More

We covered the basic concepts of blockchain, cryptocurrencies, and coin mining in our previous blog.

As we discussed, after a few evolutionary steps via Application Specific Integrated Circuits (ASICs) mining algorithms returned to their roots: the ‘humble’ personal computer. The suitability of algorithms such as CryptoNight (which underlies the Monero currency) ultimately led to the porting of the source code to JavaScript and a departure from the more traditional approach of... Read More

We’ve spent some time recently sharing news about Forcepoint’s innovations in DLP, including the integration of DLP with CASB, tailoring our options to better meet a variety of customer needs and how we’re listening to our customers when they tell us that they need more than traditional DLP to deliver better data protection. 

Human-centric cybersecurity adapts protection for users and data by understanding the behavior and interactions between identities, systems and data. Since... Read More

Today, Forcepoint aims to change the cybersecurity paradigm via Risk-Adaptive Protection. The products within this framework are integrated to provide visibility and protection unsurpassed in the industry whether you are looking to protect your data, gain visibility into SaaS usage, or stop malware from entering your enterprise.

Traditional enterprise security programs have limited means for understanding their users and therefore tend to group users by role or department (i.e.,... Read More

A Human-Centric Approach to Risk Adaptive Protection

The current cybersecurity market is oversaturated with acronyms, cryptic lingo and noise.  Government agencies are asked every day to protect critical networks with limited resources and people while government funding instability brings challenges to establishing both short and long-term plans regarding technology initiatives. Effective and seamless security solutions have never been more important given the aforementioned and... Read More

This post is an updated and expanded version of our 2017 cryptocurrency primer.

When Bitcoin (BTC) first appeared in 2009, few people had a clear idea of what it was, let alone the waves it would generate both financially and technologically. The underlying blockchain technology was more or less a new concept, and like most new concepts was poorly understood in general.

In 2018, blockchain remains a hot topic: while it is tied in many people’s minds to cryptocurrencies... Read More

We’ll have a lot to share at this year’s RSA Conference – in the booth, in speaking sessions, and at networking opportunities throughout the week. Here’s a preview of all we have going on, and some opportunities to register for events. If you’re coming to RSA, we want to meet you!

In the Booth

Stop by Booth N3525 for hands-on demos and presentations from our experts on the company’s Risk-Adaptive Protection solution, Web Security incorporating CASB capabilities, human-... Read More

The 11th Verizon Data Breach Investigations Report (DBIR) was released yesterday to the usual fanfare that accompanies this collation of trends and insights. During the last decade the annual report has been viewed as a helpful benchmark of the state of the threat landscape. This year Verizon pulled data from 53,308 real-world security incidents including 2,216 confirmed data breaches to arrive at their analysis of risks with motives, causes and potential solutions offered too.

... Read More