by gcstco | Jun 12, 2022 | Blog, News
Hacking a powered-off iPhone: vulnerabilities never sleep . Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible. Researchers from the Secure Mobile Networking Lab at the University of Darmstadt, Germany, have...
by gcstco | Jun 9, 2022 | Blog, News
2022 IT Priorities Report: Practitioners Need More Time To Innovate . In December 2021, we released the 2022 IT Priorities Report. In that report, we surveyed IT leaders around the world to document how their organizations changed in 2021 and to understand their...
by gcstco | Jun 9, 2022 | Blog, News
Alot of us here at Forcepoint look forward to the annual RSA Conference – particularly this year as it is back in person! Once again, we’ll be on the show floor in the North Expo of the Moscone Center (Booth N-5965) and on the 4th floor of the nearby St. Regis Hotel....
by gcstco | Jun 9, 2022 | Blog, News
Businesses are creating and collecting more data than ever. Far too much of this data is saved and stored – on file shares, network drives, and cloud services – “just in case” it happens to be needed later. Shockingly, upwards of 70 percent of this data holds no...
by gcstco | Jun 7, 2022 | Blog, News
Today we are pleased to announce the availability of FortiNDR which, as the name reflects, adds robust network detection and response (NDR) to the Fortinet Security Fabric. Specifically, it provides purpose-built machine learning, deep learning, pragmatic analytics,...