Data Classification: The Impact on a Zero Trust Framework

Data Classification: The Impact on a Zero Trust Framework

At first glance, it appears that data classification and Zero Trust, a cybersecurity framework, would have nothing to do with one another. After all, each has their own separate specialized function – data classification labels data based on sensitivity and Zero Trust...
Hacking a powered-off iPhone: vulnerabilities never sleep

Hacking a powered-off iPhone: vulnerabilities never sleep

Hacking a powered-off iPhone: vulnerabilities never sleep . Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible. Researchers from the Secure Mobile Networking Lab at the University of Darmstadt, Germany, have...
Catch Up with Forcepoint at RSAC 2022

Catch Up with Forcepoint at RSAC 2022

Alot of us here at Forcepoint look forward to the annual RSA Conference – particularly this year as it is back in person! Once again, we’ll be on the show floor in the North Expo of the Moscone Center (Booth N-5965) and on the 4th floor of the nearby St. Regis Hotel....