Blog
What is Malware Analysis? Defining and Outlining the Process of Malware Analysis
By Cybersecurity Experts at Fortra on Mon, 11/13/2017
Learn about malware analysis as well as how to use malware analysis to detect malicious files in Data Protection 101, our series on the fundamentals of information security.
Blog
Inside Fortra's Advanced Threat Protection: Part One
By Cybersecurity Experts at Fortra on Wed, 11/08/2017
In today's blog, the first of a three part series, we break down how Fortra's Advanced Threat Protection Real-Time Detection feature can help help provide endpoint detection visibility. Look for part two of the series on Monday, November 13.
Blog
The Role of Security Analytics in Information Security Programs
By Cybersecurity Experts at Fortra on Tue, 11/07/2017
18 infosec pros and analytics experts reveal the role of security analytics in information security programs today.
Blog
OceanLotus APT Hits Human Rights Orgs in Vietnam, China, Cambodia
By Cybersecurity Experts at Fortra on Tue, 11/07/2017
A campaign launched in May by APT32, also known as Ocean Lotus, has hit over 100 websites belonging to government, military, and human rights organizations in Vietnam, China, and Asia.
Blog
What is Point-of-Sale (POS) Malware? How it Works and How to Protect Your POS system
By Cybersecurity Experts at Fortra on Mon, 11/06/2017
Learn how POS malware works and how to protect against it in Data Protection 101, our series on the fundamentals of information security.
Blog
Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M
By Cybersecurity Experts at Fortra on Thu, 11/02/2017
Consider $2 per lost record versus $1,200 per lost record. That’s the difference between what Hilton will pay to New York State versus what it will pay to EU regulators once the GDPR takes effect in May.
Blog
What is Event Correlation? Examples, Benefits, and More
By Cybersecurity Experts at Fortra on Mon, 10/30/2017
Learn about event correlation in Data Protection 101, our series on the fundamentals of information security.
Blog
Bad Rabbit Ransomware Hits Russia, Ukraine
Wed, 10/25/2017
A previously unknown strain of ransomware, Bad Rabbit, hit roughly 200 targets across Russia, Ukraine, and Bulgaria, on Tuesday.
Blog
Endpoint Detection and Response (EDR) Solutions: Expert Tips & Strategies
By Cybersecurity Experts at Fortra on Tue, 10/24/2017
12 security experts reveal the best approaches and solutions for Endpoint Detection and Response.
Blog
Equifax’s Problem and How to Avoid It
Mon, 10/09/2017
Recently, the cause of Equifax’s catastrophic cyber attack was revealed as a hack that exploited a known bug in in Equifax’s web application software, Apache Struts.Since then, the discourse surrounding the event has shifted to two main subjects:The blame game: people want to hold someone responsible. The fallout has claimed the jobs of Equifax’s CSO, CIO, and now, CEO.The preventability of the...
Blog
Data Classification in Healthcare
Thu, 10/05/2017
Healthcare is a highly competitive industry where payers and providers are subject to significant regulatory oversight. The complex needs of these organizations, and their patients, must be delivered in as efficient a manner as possible, and with precision, while taking every precaution to ensure appropriate levels of data security and privacy.Given...
Blog
Network Mapping Software: Paid vs. Free - Which is Best?
By Kevin Jackson on Tue, 10/03/2017
Network mapping software give you visibility into network connections, performance issues, and unusual traffic spikes but what is the right tool for you: paid or free?
Blog
What is Business E-mail Compromise? How It Works, Best Practices for Protection, and More
By Cybersecurity Experts at Fortra on Mon, 10/02/2017
Learn about business e-mail compromise attacks in Data Protection 101, our series on the fundamentals of information security.
Blog
Deloitte Hack Underscores Risk of Credential Leaks
By Cybersecurity Experts at Fortra on Thu, 09/28/2017
The exact circumstances of the hack of Big 4 accounting firm Deloitte aren’t known, but evidence suggests the company was among many that fail to prevent leaks of sensitive data to cloud-based platforms like GitHub.
Blog
Equifax Breach Could Have Far-Reaching Effects
By Cybersecurity Experts at Fortra on Wed, 09/27/2017
The Equifax data breach—one of the largest breaches ever made public—has the potential to be the catalyst for a major change in the way that courts look at the damage that data breaches cause to victims.
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
Opsec Pros Share Overlooked Components of Operational Security Programs
By Cybersecurity Experts at Fortra on Tue, 09/19/2017
A panel of infosec experts discuss what the most commonly overlooked components of operational security programs are.
Blog
What is Operational Security? The Five-Step Process, Best Practices, and More
By Cybersecurity Experts at Fortra on Mon, 09/18/2017
Learn about Operational Security (OPSEC) in Data Protection 101, our series on the fundamentals of information security.
Blog
Equifax Hacked Via Six Month Old Struts Vulnerability
By Cybersecurity Experts at Fortra on Thu, 09/14/2017
Equifax confirmed that a vulnerability in Apache Struts 2, patched in March, was used to hack into the firm and steal data on 143 million individuals. Is that the whole story?