Search the Portal

Recent Articles

MAY16
Ransomware Roundup – VanHelsing

The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more.

Fortinet Blog
MAY13
In the New Era of Cybersecurity, Here’s What’s Driving Long-Term Resilience

Learn more about what approach organizations should take in the face of a new era of cybercrime.

Fortinet Blog
MAY12
Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign "Horabot" resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more.

Fortinet Blog
MAY9
Unify Your View: FortiMonitor Powerful Infrastructure Monitoring Capabilities

FortiMonitor offers the comprehensive infrastructure monitoring required to truly understand performance, availability, and health across your entire technology stack. Read more.

Fortinet Blog
MAY8
Separating Fact from Fiction: Here’s How AI Is Transforming Cybercrime

This blog post shares key takeaways from a recent RSAC panel discussion, offering defenders a clear assessment of how AI is shifting the cybercrime ecosystem today. Read more.

Fortinet Blog
MAY8
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware

FortiGuard Labs highlights a malware campaign's increasing sophistication of attack methodologies, leveraging the legitimate functionalities of remote administration tools for malicious purposes. Learn more.

Fortinet Blog
MAY7
Life at Fortinet: Making a Difference by Protecting Society

Meet Amandine Bouguessa, a Fortinet product security engineer who enjoys the challenge of identifying vulnerabilities and finding the solutions to address them.

Fortinet Blog
MAY1
District School Board Protects Its Network and Users with FortiSASE

Read how a school board expands its Fortinet platform implementing FortiSASE to enhance cybersecurity across its network with improved efficiency and protection.

Fortinet Blog
MAY1
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure

The FortiGuard Incident Response (FGIR) team recently investigated a long-term cyber intrusion targeting critical national infrastructure (CNI) in the Middle East, attributed to an Iranian state-sponsored threat group.

Fortinet Blog
APR28
Key Takeaways from the 2025 Global Threat Landscape Report

Read into how the adversary advantage is accelerating, which means organizations must change how they measure and manage risk.

Fortinet Blog
MAY2024
6 Types of DLP Solutions - and How to Pick the Right One

Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.

Forcepoint News by Bryan Arnott
MAY2024
How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) Simplify Data Security

The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory requirements is a challenge.

Forcepoint News by Carlos Carvajal
MAY2024
The Importance of Data Posture and How to Evaluate It

We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one because it often dictates how susceptible a business is to data security risks. Luckily, technology is making it...

Forcepoint News by Carlos Carvajal
MAY2024
Protecting Data Everywhere from the Cloud with Forcepoint ONE Data Security

Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.

Forcepoint News by Jim Fulton
APR2024
DSPM vs. CSPM: What Are the Differences and How to Decide?

One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive automation. With so much data being moved to the cloud, it’s understandable that Cloud Security Posture Management (CSPM) has also gained momentum. Organizations must have tools...

Forcepoint News by Tim Herr
APR2024
Forcepoint Brings AI-Powered DSPM to Customers

Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working anywhere with data everywhere. Forcepoint DSPM uses AI to enhance data security by quickly and accurately identifying and remediating data security risks before they...

Forcepoint News by Jim Fulton
APR2024
Data Security Everywhere: Tame Dark Data with Discovery and Classification

Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless cloud applications means your organization’s data gets scattered across multiple locations.

Forcepoint News by Kevin Oliveira
APR2024
Forcepoint Introduces New Partner Enablement Framework

Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top focus areas and align their learning journey to areas that best fit with their business focus and capabilities.

Forcepoint News by stacie-corcoran
APR2024
9 Data Security Best Practices to Prevent Breaches

Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.

Forcepoint News by Bryan Arnott
APR2024
We Asked People if They Used AI Tools with Security in Mind

Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.

Forcepoint News by rachel-russell