Blog

Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Blog

Human Error Meets Data Exposure: The Breach Vector No One Talks About

Human error now plays a role in 95 percent of data breaches, making it more critical than ever for security teams to treat it as the substantial threat it is. In some cases, employees intentionally expose sensitive data for personal gain. But the most pervasive insider threats aren’t malicious — they’re accidental. This challenges the notion that an organization can become invulnerable if only it...
Blog

What is Data Security Posture Management (DSPM)?

Cyber attacks are on the rise. In 2023, a PWC survey revealed an almost 10% increase in data breaches that resulted in over $1 million in damages. Threat actors are constantly adapting their techniques to stay one step ahead, and organizations need all the help they can get to protect their infrastructure from the threat of intrusion.Data security posture management (DSPM) is an essential tool in...
Blog

What are Cloud Misconfigurations?

As we use more cloud applications, it’s become harder to maintain and control our multi-cloud environments. Because of this increasing complexity, configuration errors are becoming increasingly common; Gartner says that 99% of cloud security failures will be caused by misconfiguration. To prevent breaches caused by cloud misconfigurations, organizations rely on cloud data security solutions....
Blog

How Data Protection Applies to Zero Trust

Protecting data in the context of zero trust means moving beyond perimeter-based defenses to a model where no user, device, or application is inherently trustworthy. As a result, every access request is verified, continuously monitored, and limited to the minimum necessary permissions needed to perform a job function. This approach reduces the risk of insider threats, compromised credentials, and...
Blog

The MedusaLocker ransomware gang is hiring penetration testers

MedusaLocker, the ransomware-as-a-service (RaaS) group that has been active since 2019 is openly recruiting for penetration testers to help it compromise more businesses. As Security Affairs reports, MedusaLocker has posted a job advert on its dark web leak site, which pointedly invites pentesters who already have direct access to corporate networks to make contact."If you don't have access,...
Blog

Stop Cyber Threats Before They Cost You: Protecting Financial Services with Fortra

Two in three financial institutions faced cyberattacks in 2024, and that trend shows little sign of letting up. Because of their valuable data – hooked conveniently to direct financial information – FinServ organizations are perennial targets for hungry attackers. But this isn’t news to anybody. Financial institutions understand the threats, and for the most part, they are some of the most...
Blog

AiLock ransomware: What you need to know

What is AiLock?AiLock is a ransomware-as-a-service (RaaS) operation that first came to light in March 2025. Security researchers at Zscaler noted that they had identified a cybercriminal group extorting ransoms from organisations through threats.I'm guessing the threat was the usual story of "We've stolen your data and encrypted the files on your systems - pay up or we'll dump the information on...
Blog

Swiss government warns attackers have stolen sensitive data, after ransomware attack

The Swiss government has issued a warning after a third-party service provider suffered a ransomware attack, which saw sensitive information stolen from its systems and leaked onto the dark web. Radix a non-profit health foundation, works with various federal administrations across Switzerland in areas such as promoting good nutrition, healthy exercise, and helping individuals deal with addiction,...