Blog
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To?
Mon, 03/27/2023
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
HelpSystems’ (now Fortra's) Steph Charbonneau Discusses Data Security, Corporate Culture, and More
Tue, 06/29/2021
Data security, corporate culture and more are discussed by Fortra’ Steph Charbonneau on popular blog, ModernCTO.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?
Thu, 07/16/2020
Open source and enterprise-level SIEM solutions all have pros and cons. Here are some factors to look at when comparing your options—including one you might not have considered yet.
Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Blog
Silencing the Bells: How a SIEM Can Prevent Alert Fatigue
By Bob Erdman on Tue, 07/30/2019
Find out how Security Information and Event Management (SIEM) solutions can streamline security and prevent alert fatigue.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
Five Malicious Insider Threat Indicators and How to Mitigate the Risk
By Bob Erdman on Fri, 04/05/2019
There are some telltale signs of malicious insider threats that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.