Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022
Blog
10 Best Tips to Improve Your Data Security Plan
Thu, 02/10/2022
Follow these 10 tips to help create a comprehensive data security plan for your organization or improve your existing plan.
Blog
A Cyber NTSB: DHS Announces Cyber Review Board
Thu, 02/03/2022
The board will investigate breaches and vulnerabilities to find out why they happened and how to prevent them from happening again.
Blog
How and Why to Implement Zero Trust Architecture via Layered Security
Wed, 02/02/2022
Perimeter-based security is out, Zero Trust architecture is in. Learn what Zero Trust means, why your organization should use it, and how Fortra can help.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Blog
Your 5-Minute CUI Training Study Guide
Fri, 01/28/2022
Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog
7 Cybersecurity Resolutions For 2022
Fri, 01/14/2022
It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog
Choosing the Right Data Security Solution
By Nick Hogg on Fri, 01/14/2022
Fortra goal is to help you make the best choices for your organization. Find the best data security solutions for you by asking yourself these 5 questions.
Blog
Top Benefits of Cloud-Based Access Control
By Cybersecurity Experts at Fortra on Thu, 01/13/2022
Cloud-based access control is a way to remotely control who has access to your company’s documents, data, and information. The controls can be changed from anywhere and can be gated quickly because of the cloud-based nature.The fundamental purpose of access control is to prevent unauthorized access to an environment with valued resources. An access control system, whether it’s based locally or on...
Blog
Cyber Insurance: How It Works and Why Every Organization Needs It
Fri, 01/07/2022
When a cybersecurity strategy isn't quite enough, cyber insurance may be the next best step to fight against cybercrime. Here's why every organization needs it.
Blog
Top Tips for Preventing BEC Scams
By Cybersecurity Experts at Fortra on Wed, 01/05/2022
Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.
Blog
Insider Threat: Definition & Examples
By Cybersecurity Experts at Fortra on Tue, 12/28/2021
A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.
Blog
Apache Log4j2 Security Advisory
By Mieng Lim on Thu, 12/16/2021
Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Blog
IP Theft: Definition and Examples
By Cybersecurity Experts at Fortra on Tue, 12/14/2021
IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
Vulnerability Research
Apache Log4j2 Security Advisory
Mon, 12/13/2021
Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...
Blog
NYDFS Outlines Common MFA Problems, Steps to Fix Them
Mon, 12/13/2021
The New York Department of Financial Services reiterated last week that rolling out MFA and ensuring its configured properly is essential to reducing cyber risk.
Blog
Infographic: Best Coding Practices for Secure Web Applications
Thu, 12/02/2021
Keeping your organization protected from web application vulnerabilities doesn't have to be complicated. There are some best secure coding practices that you can follow to ensure that you're protecting your customers and preventing cyber criminals from damaging your company.
...
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.