Blog

Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?
Blog

Develop a Comprehensive Cybersecurity Risk Management Strategy, Starting with Vulnerability Management

Layered Cybersecurity: A Must For Any OrganizationProtecting your company, your clients, and yourself requires a strong, comprehensive cybersecurity program that accommodates the vast and evolving digital landscape. Having the right layered security strategy in place ensures you’re protecting the whole of your business, not just select areas.Understanding the Changing Threat LandscapeCyber threats...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Blog

Application Security Tips for PCI-DSS 4.0

PCI-DSS has long been the standard for securing payment card-related information. Meeting this bar was the bare minimum requirement for showing that an organization had sufficient controls to keep this data secure. With changes to PCI-DSS already being released and required by 2024, organizations developing and running applications to collect or process payment card-related data need to get...
Blog

Automotive Industries Article

By 2024, it’s predicted there’ll be more than 400 million connected vehicles in use around the world. In Automotive Industries magazine, Aviram Jenik discusses the implications for cybersecurity and looks at how rigorous testing and standard protocols can elevate the safety of these fast-evolving vehicles. Originally published in Automotive Industries. Excerpt:“Industry regulators are meeting the...
Blog

Unexpected Possibilities as Part of Fortra: Brian Pick

In the years since Fortra acquired Brian Pick’s tight-knit software company, he and his Managed File Transfer colleagues have grown in many ways. Discover how Brian’s own career—and the company’s growth—have really taken off.
Blog

Top 3 Reasons You Need A Black Box Fuzzer

What is Black Box Fuzzing and why do you need it?Black box fuzzers attack code vulnerabilities the same way a malicious actor would. Black box fuzzing is a type of dynamic application security testing (DAST) that uses one of the widest ranges of attacks to find unexpected code input errors. The goal is to uncover conditions that can trigger crashes or contribute to new and unknown security...