Blog

Blog

Back to Basics: Why Checkbox Compliance Isn’t Enough

Compliance doesn’t protect you. It simply outlines the defenses that should have been in place. And when you’re not compliant, the gap often only comes to light after something’s gone wrong. In today’s evolving threat landscape, passing an audit isn’t enough. Security leaders need continuous visibility, actionable insights, and real-world accountability, long before an auditor ever shows up. It’s...
Vulnerability Research

August 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s August 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1169 as soon as coverage is completed.
Blog

AI Data Privacy: Challenges and Solutions

AI data privacy refers to the ethical collection, storage, and usage of personal data by artificial intelligence systems.
Blog

File Integrity Monitoring in 2025: More Than Just a Tripwire

It’s been over a decade that I’ve worked primarily in the world of File Integrity Monitoring and Secure Configuration Management, helping to ensure that hundreds of different companies are able to detect unauthorized or unexpected changes to their configurations.Security has changed a lot over that period, and yet there’s been some surprisingly consistent experiences in the field that I will often...
Blog

Compliance Breakdowns: Making Sure They Only Happen Once

Cross-functional alignment is one of the most effective tools a CIO has for maintaining compliance in a fragmented regulatory environment. However, while many understand that disparate teams working together is “what it’s all about,” many CIOs may not yet realize that it’s their responsibility to take point for the process.Or, that a successful compliance outlook doesn’t mean perfection – it means...
Blog

CMMC Compliance Checklist: Steps to Achieve Certification

CMMC is a cybersecurity standard implemented by the US Department of Defense to protect sensitive data within its supply chain. Use this checklist to help achieve certification.
Blog

Fortra Patch Priority Index for May 2025

Fortra's May 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chromium that resolve 6 issues including spoofing, out of bounds memory access, insufficient data validation, inappropriate implementation, use after free, and heap buffer overflow vulnerabilities.Next on the...
Blog

Prescription For Disaster: Sensitive Patient Data Leaked in Ascension Breach

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. To the undoubted distress of Ascension's client base, the details of hundreds of thousands have fallen into the hands of hackers, opening up opportunities for fraud and identity theft. Breached...
Blog

Tripwire Patch Priority Index for February 2025

Tripwire's February 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolve 4 remote code execution and 2 spoofing vulnerabilities.Next on the list are patches for Microsoft Office and Excel. These patches resolve 8 issues such as remote code execution and information disclosure...
Blog

VERT Threat Alert: January 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In-The-Wild & Disclosed CVEsCVE-2025-21333The first of three Hyper-V vulnerabilities this month is a heap-based buffer overflow that leads to privilege escalation to SYSTEM. Microsoft has reported this...
Blog

Highlights from Release Day 2025.1

Fortra’s 2025.1 Release Day includes improvements to email security, managed file transfer, data classification, security awareness training, and more.
Blog

What Is Data Classification?

What Is Data ClassificationAnd What Can It Do For My Business?Data classification is an approach to identifying, protecting and managing information which has rapidly become best practice. Implemented as part of a layered security strategy, it enables an enterprise to defend itself against a variety of threats - from aggressive outsiders to untrained or well-meaning insiders - while unlocking the...
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your expectations and fortify your environment like never before with Fortra.
Blog

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and Corey Markell, Associate Director, Strategic Resource Group at Fortra.The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from...