Blog

Blog

Your 5-Minute CUI Training Study Guide

Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog

7 Cybersecurity Resolutions For 2022

It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog

Apache Log4j2 Security Advisory

Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Vulnerability Research

Apache Log4j2 Security Advisory

Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...
Blog

Infographic: Best Coding Practices for Secure Web Applications

Keeping your organization protected from web application vulnerabilities doesn't have to be complicated. There are some best secure coding practices that you can follow to ensure that you're protecting your customers and preventing cyber criminals from damaging your company. ...
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.