Blog

Blog

Top 3 Reasons You Need A Black Box Fuzzer

What is Black Box Fuzzing and why do you need it?Black box fuzzers attack code vulnerabilities the same way a malicious actor would. Black box fuzzing is a type of dynamic application security testing (DAST) that uses one of the widest ranges of attacks to find unexpected code input errors. The goal is to uncover conditions that can trigger crashes or contribute to new and unknown security...
Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

From Intern to Associate Data Scientist: Josh

From Software Development Intern to Associate Data Scientist, Josh is exploring exciting avenues for career growth at Fortra. He’s even pursuing a master’s degree with tuition reimbursement!
Blog

Advanced Cyber Threat Intelligence

This blog by Dr. Edward Amoroso, Tag Cyber, provides a high-level overview of modern advances in cyber threat intelligence and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise at various levels of the intelligence process starting with data security.
Blog

11 Security Assessment Tools by Fortra for More Informed Security

Gaining a better cybersecurity posture doesn’t have to be such a painstaking process. Work to better identify, prioritize, and mitigate security vulnerabilities within your organization by gaining informed, easy-to-understand insight from Fortra’ security assessment tools.
Blog

Real Clients, Real Results: Vulnerability Management Made Easy

Stop Cyberthreats in Their Tracks With Easy to Use Vulnerability ManagementA strong cybersecurity program isn’t just a “nice to have”, it’s a “have to have.” With technology constantly evolving, workplace shifts, increasing threats, and the need for immediate response and remediation, vulnerability management and cybersecurity can seem overwhelming. Small companies or companies with limited IT...
Blog

VRT Zero-day Security Advisory

VRT Zero-day Security AdvisoryFortra Infrastructure Protection brands, Digital Defense and Beyond Security are actively monitoring the disclosure of a security issue affecting a widely used Java Framework called “Spring4Shell” or “SpringShell” which has been assigned CVE-2022-22965.The Spring framework allows Java developers to develop Java applications easily with enterprise-level components. A...
Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog

The Most Dangerous Cyberattacks Aren’t What You Expect

In 2022 Cyber Criminals Continue to Recycle Malware. Don’t Fall Prey to Outdated Attacks.It’s a known fact that cyberattacks are on the rise, but not because innovative criminals are executing new strategies or deploying novel attacks. Ironically, cyberattackers are doing what many good business people do — building off what already works. This explains why 75% of attacks utilize two years or...
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core values, and Fortra acquired Sourcio in April 2016.