See why interactions between people, data, and technology will drive cyber risk to all time highs in 2019.

Resources

Filter by:
Change the site language for resources in other languages.
The Importance of Choosing the Right CASB Solution
The Importance of Choosing the Right CASB Solution

Whitepaper

Modernizing Agency Security for Cloud Migrations
Modernizing Agency Security for Cloud Migrations

Whitepaper

A Guide to Achieving SaaS Security and Compliance
A Guide to Achieving SaaS Security and Compliance

Whitepaper

Is CDM Effectively Building Cybersecurity into Federal IT? 200 Feds Weigh In
Is CDM Effectively Building Cybersecurity into Federal IT? 200 Feds Weigh In

Whitepaper

Cybersecurity: From Reactive to Proactive, From Technical Risk to Business Risk EN
Cybersecurity: From Reactive to Proactive, From Technical Risk to Business Risk

Whitepaper

High-Availability Boundary Control
Building Resilient Domain Boundaries

Whitepaper

Forcepoint Strategies for Distributed Network Security
Forcepoint Strategies for Distributed Network Security

Whitepaper

What Keeps Security Managers up at Night?
What Keeps Security Managers up at Night?

Whitepaper

Insider Threat Program Guide
Insider Threat Program Guide

Whitepaper

The Practical Executive's Guide to Data Loss Prevention
The Practical Executive's Guide to Data Loss Prevention

Whitepaper

Understanding Office 365 Security Concerns
Understanding Office 365 Security Concerns

Whitepaper

Forcepoint Consulting Services: User and Data Security Programs
Forcepoint Consulting Services: User and Data Security Programs

Whitepaper

Rethinking Government Data Security with a Risk-Adaptive Approach

Whitepaper

Forcepoint Cloud Security Bundle

Whitepaper

Supplementing the Limitations in Office 365

Whitepaper

Protection Against Advanced Evasion Techniques in Forcepoint NGFW
Protection Against Advanced Evasion Techniques in Forcepoint NGFW

Whitepaper

CISO Insights: 7 Best Practices for a Successful Insider Threat Program
CISO Insights: 7 Best Practices for a Successful Insider Threat Program

Whitepaper

Cybersecurity and the Millennial Workforce
Cybersecurity and the Millennial Workforce

Whitepaper

Managing Workforce Cyber Risk in a Global Landscape, by Hogan Lovells
Managing Workforce Cyber Risk in a Global Landscape, by Hogan Lovells

Whitepaper

Supply Chain Compliance
Supply Chain Compliance

Whitepaper

2017 State of Cybersecurity Report - Federal Focus
2017 State of Cybersecurity - Federal Focus

Whitepaper

Making the Shift to Human Centered Security webcast transcript
Making the Shift to Human Centered Security

Whitepaper

Mission-Critical Network Security: Evolved
Mission-Critical Network Security: Evolved

Whitepaper

Cross Domain Security Rising to the Clouds
Cross Domain Security Rising to the Clouds

Whitepaper

GDPR - The Final Countdown, by Computing Research
GDPR - The Final Countdown

Whitepaper

Are You Prepared for Ransomware? From Forcepoint Security Labs
Are You Prepared for Ransomware?

Whitepaper

Securing the Digital Dream, by Computing Research
Securing the Digital Dream

Whitepaper

Protecting Data in the Healthcare Industry

Whitepaper

Complying with Data Protection Law in a Changing World (SANS)

Whitepaper

The 2017 State of Cybersecurity
The 2017 State of Cybersecurity

Whitepaper

IDC: Quantifying the Operational and Security Results of Switching to Forcepoint NGFW
IDC: Quantifying the Operational and Security Results of Switching to Forcepoint NGFW

Whitepaper

GDPR - A Guide to Key Articles for Security & Privacy Professionals (Hunton & Williams)

Whitepaper

Deploying and Managing Security in the Cloud - An Osterman Research Whitepaper
Deploying and Managing Security in the Cloud - An Osterman Research Whitepaper

Whitepaper

Cyber Security in Financial Services: A Complex Threat Requiring a Comprehensive Strategy - An Osterman Report

Whitepaper

Digital Transformation, Network Security and Forcepoint (ESG)

Whitepaper

Forcepoint CASB Sheds Light on the Cloud App Visibility Blind Spot
Forcepoint CASB Sheds Light on the Cloud App Visibility Blind Spot

Whitepaper

GDPR and Its Impact on Security and Data Protection Programs

Whitepaper

Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing (Osterman)

Whitepaper

Integrated Security Analytics – Revolutionizing DLP Incident Response

Whitepaper

Meeting the Demands of Insider Threat Government Policies and Regulations

Whitepaper

Insider Threat Federal Solutions: The Five Pillars of User Risk Mitigation
Insider Threat Federal Solutions: The Five Pillars of User Risk Mitigation

Whitepaper

9 Steps to Building an Insider Threat Defense Program

Whitepaper

Common Criteria Evaluation vs Assessment & Authorization - The Alphabet Soup Decoded

Whitepaper

Europe's Insider Threats: What CISOs Need to Know

Whitepaper

Developing Vulnerability Resistant Products

Whitepaper

Forcepoint Review: Effective Measures of Defense, by SANS
Taking Action: Effective Measures of Defense

Whitepaper

Unified Content Security Practice (part 3 of 3)

Whitepaper

Millennial Rising - “Digital Warriors” Introduce Risk to Federal IT Systems
Millennial Rising - “Digital Warriors” Introduce Risk to Federal IT Systems

Whitepaper