Blog

Vulnerability Research

Patch Tuesday Update - September 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.50.0 and FVM Agent 2.11 releases.Microsoft addressed 79 vulnerabilities in this release, including 7 rated as Critical and 23 Remote Code Execution vulnerabilities.This release also includes fixes for four vulnerabilities that have been exploited in the wild.CVE-2024-38217 and CVE-2024-38226 are Security Feature Bypass...
Blog

An Overview of Endpoint Detection and Response (EDR)

EDR, or endpoint detection and response, is a cybersecurity technology that monitors and collects data from endpoints to detect, analyze, investigate, and respond to cybersecurity threats. Learn more about EDR and how it can help organizations in this blog.
Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog

Data Classification Methods: Ensuring Security and Compliance

Data classification methods are techniques used to organize and categorize data into various distinct classes or groups. These methods are essential for numerous applications, such as data analysis and machine learning, as well as data security, data management, and regulatory compliance.What Is Data Classification?Data classification is the process of organizing and categorizing data into...
Blog

Patch Tuesday Update August 2024

The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
Vulnerability Research

Patch Tuesday Update - August 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.48.0 and FVM Agent 2.10 releases.Microsoft addressed 86 vulnerabilities in this release, including 7 rated as Critical and 28 Remote Code Execution vulnerabilities.This release also includes fixes for six vulnerabilities that have been exploited in the wild.Microsoft Project Remote Code Execution Vulnerability (CVE-2024-38189...
Blog

What Are Data Classification Guidelines & Data Classification Techniques?

Organizations must constantly make decisions about their data. This can be challenging, especially given today’s high-frequency volume and variety.Data classification guidelines provide a structure for managing, protecting, and utilizing data effectively in an organization. By following the guidelines enumerated in this article, organizations can ensure a functional and effective data...