Blog

Blog

The HELM: Fostering Innovation at Fortra

The Heuristic Engineering Lab Masterminds, or HELM, is a technology steering committee for Fortra R&D employees. Discover how programs like Hackathons and dedicated innovation days guide our technology investments and inspire employees.
Blog

Data Classification in the Finance World

When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face immense pressure to protect the data they are creating, collecting, and storing. Let’s take a deeper dive into what pressures are put on financial organizations to protect their data, and what they can do to...
Blog

Patch Tuesday Update September 2023

This is my 211th Patch Tuesday in a role where I’m performing a complete analysis of the released Microsoft patches. It’s amusing to me to see what has changed and what has stayed the same.
Blog

Patch Tuesday Update - September 2023

Today’s Microsoft Security Update includes Microsoft Patch Tuesday checks in the NIRV 4.28.0 and Fortra VM Agent 1.64.0 releases.Microsoft addressed 59 vulnerabilities in this release, including five rated as Critical.This release also includes three republished non-Microsoft CVEs to address issues in Microsoft Edge (Chromium-based), Visual Studio Code, and 3D Viewer.Two of the CVEs fixed in this...
Blog

How to Lock CAD Files Securely & Protect Your IP

Industrial designs and CAD files are vital intellectual property assets in the U.S. manufacturing sector, making their protection against industrial espionage critical. As manufacturing drives technological innovation and patent generation, securing CAD files is essential to safeguard system designs and R&D efforts. Understanding effective methods to lock these files is key to preserving IP integrity.
Blog

What Is Cloud Security?

Cloud security is the collection of plans, processes, and technologies that allow you to safely manipulate cloud-based data at rest, in use, and in motion. A comprehensive cloud-based security strategy encompasses several key elements.