unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DSPM Operating at the Speed of GenAI
Until just a few years ago, the idea of using AI in our personal and professional l...
2024-7-25 20:17:35 | 阅读: 0 |
收藏
|
Forcepoint - www.forcepoint.com
genai
dspm
security
chatgpt
mitigates
Powering People-Centric HR Practices with Generative AI
As we grapple with the ongoing phenomenon of the generative AI (GenAI) boom, one thing we’ve...
2024-7-23 20:17:54 | 阅读: 0 |
收藏
|
Forcepoint - www.forcepoint.com
genai
chief
officer
council
security
Is SWG Dead?
Businesses rely on web-based cloud services, remote work, and a diverse array of devices for pr...
2024-7-22 23:38:3 | 阅读: 2 |
收藏
|
Forcepoint - www.forcepoint.com
security
swg
swgs
sse
genai
Threat Actors Use Telegram APIs for Harvesting Credentials
Executive SummaryIn recent weeks, there has been an increase in phishing attacks, co...
2024-7-22 19:59:27 | 阅读: 1 |
收藏
|
Forcepoint - www.forcepoint.com
phishing
visitor
hxxps
landing
submission
Security News You Can Use—Issue 16
Here are the articles getting our attention: Introducing the Coalition for Secure AI (CoSA...
2024-7-19 20:58:25 | 阅读: 1 |
收藏
|
Forcepoint - www.forcepoint.com
security
fin7
cosai
ransomware
phishing
Safeguarding a new era of AI Transformation with Forcepoint GenAI Security
Today marks an important milestone in both the GenAI and security industries. Force...
2024-7-19 00:27:2 | 阅读: 6 |
收藏
|
Forcepoint - www.forcepoint.com
genai
chatgpt
security
dspm
ShadowRoot Ransomware Targeting Turkish Businesses
Our X-Labs team’s research seems to have discovered and identified basic ransomwar...
2024-7-12 20:11:33 | 阅读: 7 |
收藏
|
Forcepoint - www.forcepoint.com
stage
payload
rootdesign
thedream
powershell
The Real Deal Behind Forcepoint's AI Mesh
In today's rapidly evolving world of data security technology, the term "AI-powered" i...
2024-7-10 20:1:32 | 阅读: 0 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
kevin
slm
genai
Demystifying "AI-Powered" Claims: The Real Deal Behind Forcepoint's AI Mesh
In today's rapidly evolving world of data security technology, the term "AI-powered" i...
2024-7-10 20:1:32 | 阅读: 4 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
kevin
slm
genai
Police shut down 600 Cobalt Strike servers, Cloudflare tool to stop AI bots, Infostealer malware logs used to identify CSAM website members and more
This issue starts with a global police operation took down nearly 600 servers used by cybercrim...
2024-7-5 20:25:14 | 阅读: 0 |
收藏
|
Forcepoint - www.forcepoint.com
openssh
bots
identify
polyfill
combat
Six Remote Work Security Best Practices to Safeguard Data
The shift to remote work represents one of the biggest changes to how employes get...
2024-7-3 21:20:40 | 阅读: 5 |
收藏
|
Forcepoint - www.forcepoint.com
security
remote
dspm
dlp
audits
Securing Copilot with Forcepoint DSPM
Is your organization’s data safe wit...
2024-7-1 20:10:40 | 阅读: 2 |
收藏
|
Forcepoint - www.forcepoint.com
copilot
microsoft
dspm
security
tagging
Forcepoint DSPM Orchestration Automates Data Governance
Workflow orchestration plays a critical role in data security and privacy management. It automa...
2024-6-25 20:17:7 | 阅读: 7 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
workflows
identifies
URL shortener in a Microsoft Word file that leads to Remcos RAT
Note: Recently, in our X-Labs telemetry data, we found a Word doc (FAKTURA.docx) that deplo...
2024-6-24 20:26:59 | 阅读: 13 |
收藏
|
Forcepoint - www.forcepoint.com
malicious
duckdns
c2
equation
hxxp
What Does Data Security Automation Look Like in the Age of AI?
The role of automation in data security has traditionally been limited by the need for...
2024-6-21 20:2:33 | 阅读: 3 |
收藏
|
Forcepoint - www.forcepoint.com
security
accuracy
dspm
processes
playbooks
Manny Rivelo and Karl Triebes Talk DSPM and Cloud DLP
A few weeks ago, we launched two...
2024-6-17 19:25:50 | 阅读: 5 |
收藏
|
Forcepoint - www.forcepoint.com
security
lionel
everywhere
dspm
menchaca
AI-Powered Accuracy in Forcepoint DSPM
Data is the lifeblood of modern businesses, fueling innovation and growth. However, its sheer v...
2024-6-10 20:53:9 | 阅读: 3 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
accuracy
machine
SEC Cybersecurity Disclosure Rule: What it is and How to Comply
Get Visibility and Control Over Your Data Origin of the SEC Cybersecurity...
2024-6-4 20:41:7 | 阅读: 6 |
收藏
|
Forcepoint - www.forcepoint.com
security
disclose
everywhere
6 Types of DLP Solutions - and How to Pick the Right One
Picking the right type of DLP solution comes down to how it’s deployed, what data it can protec...
2024-5-30 20:33:16 | 阅读: 3 |
收藏
|
Forcepoint - www.forcepoint.com
dlp
cloud
security
network
premises
How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) simplify data security
The way businesses operate is more complex than ever before. Data continues to move...
2024-5-28 19:45:10 | 阅读: 4 |
收藏
|
Forcepoint - www.forcepoint.com
security
dspm
cloud
dlp
rap
Previous
1
2
3
4
5
6
7
8
Next