Blog

Blog

Understanding the Saudi NDMO Standards

As governments find themselves switching fully to digital methods, it becomes time to definitively establish the rules of the security game. The Kingdom of Saudi Arabia’s (KSA’s) National Data Management and Personal Data Protection Standards are designed to do just that, setting for the cybersecurity practices that will safeguard public and government-owned data as part of the Vision 2030 initiative.
Vulnerability Research

Patch Tuesday Update - September 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.50.0 and FVM Agent 2.11 releases.Microsoft addressed 79 vulnerabilities in this release, including 7 rated as Critical and 23 Remote Code Execution vulnerabilities.This release also includes fixes for four vulnerabilities that have been exploited in the wild.CVE-2024-38217 and CVE-2024-38226 are Security Feature Bypass...
Blog

An Overview of Endpoint Detection and Response (EDR)

EDR, or endpoint detection and response, is a cybersecurity technology that monitors and collects data from endpoints to detect, analyze, investigate, and respond to cybersecurity threats. Learn more about EDR and how it can help organizations in this blog.
Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog

Data Classification Methods: Ensuring Security and Compliance

Data classification methods are techniques used to organize and categorize data into various distinct classes or groups. These methods are essential for numerous applications, such as data analysis and machine learning, as well as data security, data management, and regulatory compliance.What Is Data Classification?Data classification is the process of organizing and categorizing data into...
Blog

Patch Tuesday Update August 2024

The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
Vulnerability Research

Patch Tuesday Update - August 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.48.0 and FVM Agent 2.10 releases.Microsoft addressed 86 vulnerabilities in this release, including 7 rated as Critical and 28 Remote Code Execution vulnerabilities.This release also includes fixes for six vulnerabilities that have been exploited in the wild.Microsoft Project Remote Code Execution Vulnerability (CVE-2024-38189...