Blog

Blog

Back to Basics: Why Checkbox Compliance Isn’t Enough

Compliance doesn’t protect you. It simply outlines the defenses that should have been in place. And when you’re not compliant, the gap often only comes to light after something’s gone wrong. In today’s evolving threat landscape, passing an audit isn’t enough. Security leaders need continuous visibility, actionable insights, and real-world accountability, long before an auditor ever shows up. It’s...
Vulnerability Research

August 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s August 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1169 as soon as coverage is completed.
Blog

File Integrity Monitoring in 2025: More Than Just a Tripwire

It’s been over a decade that I’ve worked primarily in the world of File Integrity Monitoring and Secure Configuration Management, helping to ensure that hundreds of different companies are able to detect unauthorized or unexpected changes to their configurations.Security has changed a lot over that period, and yet there’s been some surprisingly consistent experiences in the field that I will often...
Blog

Compliance Breakdowns: Making Sure They Only Happen Once

Cross-functional alignment is one of the most effective tools a CIO has for maintaining compliance in a fragmented regulatory environment. However, while many understand that disparate teams working together is “what it’s all about,” many CIOs may not yet realize that it’s their responsibility to take point for the process.Or, that a successful compliance outlook doesn’t mean perfection – it means...
Blog

Fortra Patch Priority Index for May 2025

Fortra's May 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chromium that resolve 6 issues including spoofing, out of bounds memory access, insufficient data validation, inappropriate implementation, use after free, and heap buffer overflow vulnerabilities.Next on the...
Blog

Prescription For Disaster: Sensitive Patient Data Leaked in Ascension Breach

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. To the undoubted distress of Ascension's client base, the details of hundreds of thousands have fallen into the hands of hackers, opening up opportunities for fraud and identity theft. Breached...
Blog

Tripwire Patch Priority Index for February 2025

Tripwire's February 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolve 4 remote code execution and 2 spoofing vulnerabilities.Next on the list are patches for Microsoft Office and Excel. These patches resolve 8 issues such as remote code execution and information disclosure...
Blog

VERT Threat Alert: January 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In-The-Wild & Disclosed CVEsCVE-2025-21333The first of three Hyper-V vulnerabilities this month is a heap-based buffer overflow that leads to privilege escalation to SYSTEM. Microsoft has reported this...
Blog

Highlights from Release Day 2025.1

Fortra’s 2025.1 Release Day includes improvements to email security, managed file transfer, data classification, security awareness training, and more.
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your expectations and fortify your environment like never before with Fortra.
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Blog

Network Scanner

Let's face it. Today's businesses can't function without IT infrastructure. Computers, laptops, phones, and other IT devices are essential for storing and sharing important files and data.With such an essential function, businesses, both big and small, need a professional IT team to maintain and improve their network security. If you think your company is too small for criminals to notice, think...
Blog

Website Vulnerability Scanner

Hackers will take advantage of any weakness in your cybersecurity systems, especially the most vulnerable parts of your IT infrastructure -- web applications.By design, web applications are publicly accessible on the internet at all times, giving hackers near unlimited access to breach unprotected web servers without being on premises. Fortunately, you can prevent this with a reliable website...
Blog

How to Answer Key Capacity Planning Strategy Questions

Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year. If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked. Do you have enough resources on hand for the...
Blog

The True Cost of Workload-Related Outages

Underestimating the consequences of downtime can be hugely detrimental to your productivity. Accurately calculating those costs won’t just prevent disasters, but also help you effectively manage your capacity planning efforts.