Blog

Blog

What Are Privileged Accounts? Common Types & Security Risks

In cybersecurity, privilege refers to the authority that certain accounts have; what they can and can't perform. When it comes to privileged accounts, there's a handful of different types, and with them, no shortage of challenges for managing and securing them.
Blog

Introducing Fortra's Data Classification

We’re writing today to share news about an exciting new beginning for the Titus and Boldon James products. Fortra has long been a global expert in software for data classification and we’re thrilled to share that beginning today, the two brands will live under the same roof, on a new microsite, as Fortra’s Data Classification. Whether you're looking for product information, educational data...
Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Blog

Government Supply Chain Cybersecurity

Government agencies are a huge target for attackers, and with a hyper-distrubuted supply chain, they are easier to access than ever. Discover what it takes to keep your public sector supply chain safe and how Fortra can help.
Blog

Patch Tuesday Update November 2023

This month brings us 63 Microsoft CVEs and 15 non-Microsoft CVEs, with Microsoft continuing the recent trend of splitting out CVEs. To understand this a bit more, we need to talk about CVE Numbering Authorities or CNAs.
Blog

Patch Tuesday Update - November 2023

Fortra VM will include these Microsoft Patch Tuesday checks in the NIRV 4.31.0 and Agent 2.1 releases. Microsoft addressed 58 vulnerabilities in this release, including 3 rated as Critical and 15 Remote Code Execution vulnerabilities. This release includes three vulnerabilities that have been exploited in the wild along with three vulnerabilities that have been publicly disclosed before Patch...
Blog

What Is Cybersecurity Maturity?

A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Blog

Data Categorization or Data Classification?

In the last few years, there has been a dramatic shift from data classification being a “nice to have” tool, to becoming a necessity.Behind this momentum, private companies and organizations are implementing data classification using “traditional” taxonomies and schemas that work for governments and militaries but don’t necessarily translate well into...
Blog

Why Some Companies Skip Vulnerability Management

Vulnerability Management may not be the most glamorous aspect of cybersecurity. But just like car insurance, brushing your teeth, and yearly physicals – it is absolutely vital to catching problems before it’s too late. It’s no secret that many companies struggle for resources, especially their security departments. And some unfortunately decide to skip security fundamentals that don’t include...