Blog
7 Tips for Delivering Exceptional IT Network Monitoring Support to End Users
By Kevin Jackson on Tue, 05/12/2020
Tech-driven organizations need IT in order to stay productive and meet business goals. As demands on IT departments grow, how can IT continue to deliver exceptional support and service to end users even as demands on their time are higher than ever?
Blog
Better Enterprise Security Through Forced Quarantine
Sun, 05/10/2020
This article was originally published on TechAeris on May 08, 2020.What do you do if a small infected minority is threatening to infect the rest? By now, there probably isn’t a human being on the planet that doesn’t know the answer to this question: you place the infected in quarantine, separating them from the healthy. Collectively, throughout the world, we are distancing ourselves from the...
Blog
Why Ignoring Web Application Security Can Be Costly
Fri, 05/08/2020
It’s easy to forget how dramatically the delivery of tech tools has changed over the decades. These days, few of us depend on a long list of desktop apps to do our work. Instead, we spend our working day logged into several web apps - simultaneously.Likewise, we can miss just how complex and interconnected the web app ecosystem is. Think you’re just using a single web app provided by a single...
Blog
Security GPA®: Making the Grade with Risk-Based Prioritization
By Mieng Lim on Wed, 05/06/2020
Security GPA is one the most-used, and most-loved features in Fortra Vulnerability Management platform. Designed for risk prioritization, Security GPA is predicated upon a simple metric that resonates across all levels of an organization. Based on the academic grading system that uses both a four-point numerical scale in tandem with the letter grades A-F, Security GPA has grown into a powerful and...
Blog
3 Ways Peer Insight Illustrates Cybersecurity Performance
Thu, 04/30/2020
Cybersecurity is now a business requirement for most organizations. However, it’s often difficult to report on your security team’s performance to non-technical stakeholders and leadership. Senior leaders deal with conflicting priorities across the entire business. Therefore, it’s crucial to communicate the risks to your organization in a way that resonates.Vulnerability management is one of the...
Blog
Top 10 Tips to Improve Web Application Security
Tue, 04/28/2020
Web applications are exposed. Unlike internal network applications, everyone can get to a web application; all they need is an internet connection. That includes hackers too. In fact, an automated tool may be attacking the web applications you depend on as you read this article.But developers often overlook web application security. Teams frequently spend all their energy on the code, the visual...
Blog
Everything You Need to Know About Web Security
Fri, 04/24/2020
Last updated on April 24, 2020.Web security, your site and your networkWeb sites are unfortunately prone to security risks. And so are any networks in which web servers are connected. Setting aside risks created by employee use or misuse of network resources, your web server and the site it hosts present your most serious sources of security risk.Web servers by design open a window between your...
Blog
Defuzzing API Testing: The Search for Vulnerabilities
Mon, 04/20/2020
REST APIs have allowed us to create modern web and mobile applications; By using the power of an API, we can open up the world of services – pulling in data and sharing information and oiling the wheels of the internet.But building an API-enabled service also means that you potentially open up your web or mobile application to cybercriminals.In the first nine months of 2019, 7.9 billion data...
Blog
Information Security Goes Non-Binary
Fri, 04/17/2020
This article was originally published on HelpNetSecurity on April 16, 2020.Finding security holes in information systems is as old as the first commercially available computer. Back when a “computer” was something that sat in a computer room, users would try to bypass restrictions, sometimes simply by trying to guess the administrator’s password.Later when Bulletin Board Systems (the primitive...
Blog
Is Automation the Future of Pen Testing?
Wed, 04/01/2020
This article was originally published on Enterprise Management 360 on March 31, 2020.Penetration testing is the Marmite of cybersecurity: you either love it or you hate it. Taking a neutral stance on the matter, it’s easy to see both sides. On one hand, pen testing provides indisputable evidence of vulnerabilities for organisations to action. Pen testers are also often able to identify even the...
Blog
How to Manage Employees Devices Properly: Employee Device Management
Wed, 03/25/2020
Across the world, companies like Google, Microsoft, Amazon, Twitter, and yes, Fortra, have asked their employees to work from home in response to the Coronavirus (Covid-19) pandemic. As employees move from on-premises offices to their homes, businesses will be faced with the challenge of managing and securing both company-owned and employee-owned devices as they access company resources from...
Blog
PCI Vulnerability Scanning
By Mieng Lim on Sat, 03/21/2020
Accepting credit card payments is an everyday task all small business owners and merchants must perform when conducting transactions. However, if you handle consumers’ credit card information, there are inherent data security risks to manage and mitigate.Security holes in your payment processing system can result in stolen client information or identity theft, and you’ll have to pay your bank a...
Blog
MSPs and the Fight Against Ransomware
Fri, 03/13/2020
It seems many cybercriminals have begun to set their sights on Managed Service Providers (MSPs). In fact, 80% of MSPs say their organization has been targeted by ransomware.Not unlike the rest of us, cyber attackers want to work smarter, not harder. If they are able to successfully infiltrate one MSP’s network, they can potentially gain access to all of their clients’ systems as well. The more...
Blog
SQL Injection Testing: Vulnerabilities & How To Prevent SQL Injection Attacks
Wed, 02/26/2020
The tester’s aim when performing a website or system test is to ensure that the product being tested is protected as much as possible. Application security testing is typically performed to secure these networks and systems. To perform this type of test, it is necessary to consider which attacks are most likely to occur. One of the most common types of attacks is SQL injection (SQLi). These are...
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
The 5 Human Elements Of Cybersecurity Every CSO Should Review
Wed, 02/19/2020
On one level, cybersecurity is all about electronics – securing machines, networks and so forth. But, even the most technologically advanced cyber attacks are driven by human motivation.Humans motivate cyberattacks, and humans also, often unknowingly, facilitate cyberattacks. People are essential to mounting a defence as well – as much as automated tools are a powerful barrier.It’s no surprise,...
Blog
The One IT Software Every Organization Should Budget for This Year
By Kevin Jackson on Tue, 02/11/2020
Now’s the time when organizations finalize their budgets for next year. As spending increases on technology, investing in a network monitoring tool is more important than ever. Find out why and how to justify the ROI to your boss in this article.
Blog
What Does “Real-Time Network Monitoring” Mean, Exactly?
By Kevin Jackson on Fri, 01/31/2020
Real-time network monitoring usually means very, very fast and frequent network polling—which is close enough to real-time that we don’t bother to add caveats around it.
Blog
Top 3 Attack Vectors Ransomware Loves to Exploit
Tue, 01/28/2020
At the ripe old age of 30, ransomware could be considered antique in the malware world. This particular type of malicious software has been around since 1989, when the first version was created by the “Father of Ransomware”, Joseph L. Popp. Disseminated via mailed floppy disks, the program demanded a hefty ransom of $189 to free victims’ data.A lot has changed since then and ransomware has matured...