Blog

Blog

How to Proactively Harden Your Environment Against Compromised Credentials

How many user accounts do you have? Emails, social media, online shopping, streaming services—and that doesn’t even begin to account for professional logins. By the time you add them all up, it’s likely one hundred or more unique accounts.According to NordPass, the average user maintains an average of 168 logins for personal purposes, and no less than 87 for the workplace. This is an extraordinary...
Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

3 Key Takeaways from AWS re:Inforce 2024

Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog

Four Key Cybersecurity Highlights from Infosecurity Europe

Infosecurity Europe 2024 saw a tightened focus on this year’s real security agenda: a holistic approach to data protection, scrutiny on the supply chain, and the ever-wary eye toward AI and its many uses. Fortra’s Steve Audsley, EMEA Solution Engineering Manager for Data Protection, shares his experience.