Blog
Financial Sector Cybersecurity: How Do You Compare To Your Peers?
Wed, 09/16/2020
Comparing and quantifying your cybersecurity posture against peer organizations in the financial sector provides valuable context for how your cybersecurity program performs relative to others in your industry. Digital Defense’s Insight peer comparison report in the Fortra Vulnerability Management platform vulnerability and threat management platform provides actionable and detailed intelligence...
Blog
How to Comply with Accountability in Data Protection
Wed, 09/16/2020
A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.
Blog
Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities
Mon, 09/14/2020
Microsoft Domain Controller “ZeroLogon” VulnerabilityA recent disclosure by Dutch security firm Secura B.V. has highlighted how dangerous a Netlogon vulnerability (CVE-2020-1472) included in the August 2020 Patch Tuesday release can be to a network. To exploit this vulnerability, an attacker with an established foothold in an internal network could exploit the weak cryptographic algorithm used by...
Blog
How to Mitigate a DDoS Attack
Thu, 09/10/2020
Following a rash of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks worldwide, countries are offering guidance.
Blog
The Rising Role of Managed Service Providers in the Fight Against Cyber Attacks
Tue, 09/08/2020
In the battle against cyber adversaries, IT security professionals have to carefully balance competing objectives; protecting business assets and processes while enabling legitimate business operations and initiatives. Maximizing both objectives is challenging, especially in a highly competitive and digitally connected business environment. Far too frequently, sacrifices in cyber defenses and...
Blog
35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)
Tue, 09/08/2020
Need a new cybersecurity joke to start off your next team happy hour or a fresh funny graphic for an upcoming presentation? Check out the latest cybersecurity jokes, puns, and one-liners of 2020.
Blog
How Automated Detection and Network Access Control Work Together to Improve Incident Response
Thu, 09/03/2020
When a network or device is compromised, it is critical to respond as quickly as possible in order to minimize the risk to your business. To have an almost instantaneous incident response, you have to do two things: you have to detect the incident immediately and you have to respond immediately. Here we’ll show how combining automated detection with network access control (NAC) can improve...
Blog
The Top Tips for IP Protection for Manufacturing Firms
By Cybersecurity Experts at Fortra on Thu, 09/03/2020
With industrial espionage on the rise, we asked 24 manufacturing experts the best ways to protect intellectual property at manufacturing firms.
Blog
Slack Desktop Application RCE Vulnerability
Wed, 09/02/2020
Slack Desktop Application Remote Code Execution (RCE) Vulnerability
A RCE flaw was disclosed on August 31st, 2020, which affects the users of the Windows, Mac OS, and Linux desktop application versions of Slack. Users that click on an HTML injected image, will be redirected to an attacker’s server where a malicious javascript payload will be executed within the Slack application on their local...
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Blog
Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant
Thu, 08/27/2020
Digital Guardian has been named a “Top Player” in The Radicati Group’s Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.
Blog
Office 365 Can Now Open Attachments in a Sandbox
Wed, 08/26/2020
Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.
Blog
Penetration Test Pitfalls to Avoid
Tue, 08/25/2020
While pen testing has been around since the 1960s, not all organizations have yet perfected the art of conducting them. In fact, not all companies are taking advantage of them, but that’s a conversation for another time.Below are a few common pitfalls that even experienced security teams fall victim to from time to time.Wrong FrequencyPenetration tests evaluate your security posture at the moment...
Blog
Start Using Fuzzing to Improve Autonomous Vehicle Security
Sun, 08/23/2020
This article was originally published on Techaeris on August 07, 2020.For centuries, the automotive industry has benefited from the rapid development of technology. From the introduction of Ford’s Model A back in 1903 till in recent times, when cars are being equipped with assistive sensors helping the driver park safely, with the evolution of multimedia systems, or the computerized engine systems...
Blog
It Takes Two. Why You Need Agentless & Agent-Based Scanning
Tue, 08/18/2020
With the increased normalization of remote work, many organizations are dealing with an attack surface that has expanded beyond traditional network bounds. A new imperative exists for IT and security teams to adopt broader work-from-home security practices. This includes updating vulnerability scanning and management strategies to monitor both remote endpoints and network assets effectively. A...
Blog
Certified Information Security Manager (CISM): Definition, Certification Pathway, & More
By Cybersecurity Experts at Fortra on Tue, 08/18/2020
CISM (Certified Information Security Manager) is an advanced certification designed for IT professionals who focus on information security management. Here, we’ll discuss what CISM is, the CISM certification process, and the benefits of being CISM-certified.
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
Researcher Pleads Guilty to Scientific Trade Secret Theft
Mon, 08/10/2020
The researcher worked for the hospital for 10 years but acknowledged last month that and her husband stole its data and used it to launch two companies, one in China, one in the US.
Blog
What Does a Data Breach Cost?
By Cybersecurity Experts at Fortra on Thu, 08/06/2020
Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.