Blog

Blog

The Four Essentials for Scalable Cloud Security and Compliance

In the evolution of cloud computing, at first it was just about moving some workloads to the cloud. Next, companies realized that whatever they move to the cloud needs to be secured. As time went by, it seemed that everything moved to the cloud, including data that not only had to be secured, but also had to be in compliance with one or more regulations.As more and more workloads migrate to the...
Blog

More Than a Scan: Vulnerability Management Provides Vital Context and Direction

With sophisticated and persistent cyberattacks on the rise, it has never been more critical for organizations to outpace savvy criminals and prevent costly security risks. It is essential that businesses today are able to utilize risk-based vulnerability management scans to identify and eliminate system weaknesses before they are exploited. This is best accomplished by proactively and effectively...
Blog

What is Data Security?

Tackling data security requires understanding and classifying data, detecting and preventing leaks, and securing and protecting it at rest and in motion. Layering security solutions offers the best protection against cybersecurity threats.
Blog

How Financial Organizations Can Manage Risk During Digital Transformation

Data breaches have always been a threat against the financial sector, but they’re becoming more and more common in our interconnected, always-on world. An increase in cyberattacks means there are more opportunities for devastating data leaks in your organization, leading to hefty fines and financial losses.IT leaders need to strengthen their infrastructure against vulnerabilities to stop attacks...
Blog

SAST vs DAST: Partners or Enemies?

In our fast-paced digital world, the pressure is on to release new apps, features and enhancements as quickly and as often as possible. But how do you manage constant code changes without introducing security vulnerabilities?And how do you address the elephant in the room that comes with increased usage of cloud apps in the wake of the disruption caused by COVID-19? New applications open new doors...
Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study, which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here. ...
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Blog

Five Steps for Successful IBM i Role Swaps

Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Blog

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

Microsoft Exchange Server Remote Code Execution (RCE) VulnerabilityOn Tuesday, March 2nd, Microsoft released an out-of-band security update to mitigate four zero-day vulnerabilities that were observed being exploited in the wild against Microsoft Exchange Servers. A server-side request forgery (SSRF) being tracked as CVE-2021-26855 is the likely initial access for attackers. Exploitation of this...
Vulnerability Research

NETSHIELD Corporation Nano 25 Vulnerability

We are disclosing a vulnerability identified in NETSHIELD Corporation Nano 25. The engineers at NETSHIELD Corporation were prompt in their response when notified of the flaw and have provided a patch for the cyber security issue.NETSHIELD Corporation has released a patch for the affected Nano 25 version 10.2.18.Fortra VM will not include an explicit check for this vulnerability due to the...