Blog

Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Blog

When Digital and Physical Threats Intertwined: The Need for Executive Protection

Executives face growing risks from both digital and physical threats, with online exposure often leading to real-world dangers like harassment or security breaches. Traditional physical security alone is no longer sufficient — organizations must integrate digital executive protection, including threat monitoring, data exposure mitigation, and coordinated response across teams.
Blog

What Are External Security Threats in Cybersecurity?

According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name...
Blog

What Is ISO 27001 and How Can It Help Your Organization?

What Is ISO 27001?ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing and managing information security in an Information Security Management System (ISMS).Since it was first developed, the goal of the standard has been to provide a model for establishing, implementing,...
Blog

Open PGP for IBM i (iSeries)

GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus. With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...
Blog

Executive Impersonation Techniques on Social Media

Threat actors are masquerading as executives on social media for purposes of stealing credentials and damaging popular brands. Today, many executives have accounts on these platforms to network as well as post content promoting their companies. Unfortunately, it is easy for bad actors to create fake accounts and reach massive audiences by impersonating well-known individuals. These types of...