Blog

Blog

Advanced Cyber Threat Intelligence

This blog by Dr. Edward Amoroso, Tag Cyber, provides a high-level overview of modern advances in cyber threat intelligence and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise at various levels of the intelligence process starting with data security.
Blog

11 Security Assessment Tools by Fortra for More Informed Security

Gaining a better cybersecurity posture doesn’t have to be such a painstaking process. Work to better identify, prioritize, and mitigate security vulnerabilities within your organization by gaining informed, easy-to-understand insight from Fortra’ security assessment tools.
Blog

Real Clients, Real Results: Vulnerability Management Made Easy

Stop Cyberthreats in Their Tracks With Easy to Use Vulnerability ManagementA strong cybersecurity program isn’t just a “nice to have”, it’s a “have to have.” With technology constantly evolving, workplace shifts, increasing threats, and the need for immediate response and remediation, vulnerability management and cybersecurity can seem overwhelming. Small companies or companies with limited IT...
Blog

VRT Zero-day Security Advisory

VRT Zero-day Security AdvisoryFortra Infrastructure Protection brands, Digital Defense and Beyond Security are actively monitoring the disclosure of a security issue affecting a widely used Java Framework called “Spring4Shell” or “SpringShell” which has been assigned CVE-2022-22965.The Spring framework allows Java developers to develop Java applications easily with enterprise-level components. A...
Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Blog

Data Protection In A World Of Ever-Increasing Privacy Regulations

Data privacy regulations have really come into play over the last four years. Consumers are becoming more concerned about the disclosure and use of their data and trust is playing a key role. According to a survey conducted by Salesforce, 48% of consumers said they had lost trust in brands during the pandemic due to misuse of personal information. As...
Blog

The Most Dangerous Cyberattacks Aren’t What You Expect

In 2022 Cyber Criminals Continue to Recycle Malware. Don’t Fall Prey to Outdated Attacks.It’s a known fact that cyberattacks are on the rise, but not because innovative criminals are executing new strategies or deploying novel attacks. Ironically, cyberattackers are doing what many good business people do — building off what already works. This explains why 75% of attacks utilize two years or...
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core values, and Fortra acquired Sourcio in April 2016.
Blog

Five Ways to Improve Security and Prevent Third Party Data Breaches

So far this year, the majority of data loss incidents have had one thing in common: they revolved around third party data breaches. It’s certainly not a new risk vector, but in our hyper-collaborative economy, it’s rapidly rising in its significance. Whether you’re in financial services, telecommunications, manufacturing, or Hollywood, your greatest risk to data loss occurs when content moves outside of your direct control. But, we can’t afford to stop collaborating. What companies need is a way to keep control over this valuable information without paralyzing their ability to do business. In other words, it’s time to rethink the way companies address vendor security. As more stringent data protection regulations go into effect (GDPR, the New York DFS cyber-security requirements, etc.), it will be up to every company to keep pace. Companies need strong preventative controls that protect their data as it leaves their hands, especially when it’s stored with third parties. The bigger, stronger walls we’ve built are excellent at keeping attackers out, but they can’t protect data we’ve entrusted with others. But, by applying security and identity-based access controls directly to the data, companies can mitigate the risk of human errors that occur when employees accidentally autocomplete an external email address, forward a file they shouldn’t, or move sensitive data off of controlled systems. While people will always be a weak link in the information security process, by applying encryption to sensitive data by default and setting automated policies and controls, IT can take the human decision making out of the security equation. To accomplish this task, we’ve compiled five recommended practices that can help organizations move to a more proactive, data-centric security model. First, take a data-centric approach By taking a data-centric approach, organizations can enable their employees to confidently collaborate freely with whomever they choose, all while ensuring the highest levels of security, visibility and control. Encrypt more data by default Another mistake companies make is putting complete trust into their employees to do the right things. Let IT make it easy for them and set policies that will automatically be applied when data is created or shared externally. Plan for auditing and compliance now With all the new regulations in the US and abroad, almost all companies are now required to provide a paper trail or audit log of what happens to their data. While it’s a requirement, taking steps to plan for these audits today will make you incredibly prepared in the event of a third party data breach. When you can see who has tried accessing your data, and where, you can mitigate the risk of having to issue a notification, and can take steps to minimize future issues. Make identity a central component of security Tying access control to identity gives you control over who has access to your data by making users authenticate to you directly using an email alias. This can prevent forwarding information to unauthorized users or accidentally fat-fingering an email address. Giving data owners the ability to control who can access your data and limit what they can do with it once it’s accessed provides an extra layer of security. Don’t just monitor: take direct control of your data In the event of a third-party data breach, or if your data accidentally finds itself in the wrong hands, you need to be able to kill access to it at a moment’s notice. No matter how high or how strong we build protective barriers, we’re always going to be at risk of a breach, and a hacker’s biggest win is gaining access to your data. Proactively locking down any data they may get their hands on is a huge advantage. By taking a data-centric security approach, you can protect your team against data loss, even for files that have left your physical control. Moreover, you can proactively prevent unauthorized access, and track precisely who should (and who should not) have access to your data. This approach will let you secure files and communications throughout their entire lifecycle, and you’ll be confident that even if your data is sent externally, you can still verify that it was used appropriately. To see how Digital Guardian Secure Collaboration is helping companies across the Fortune 1000 tackle these issues and how you can adapt your team to a more data-centric strategy, check out our Definitive Guide to Data Security.