Blog

Blog

PII vs. SPI: Protecting Sensitive Information

Learn the key differences between Personally Identifiable Information (PII) and Sensitive Personal Information (SPI), as well as their definitions, examples, and regulatory requirements. Understanding these distinctions is crucial for effective data protection and compliance with evolving privacy regulations.
Blog

Data Security Policy Template: Tips & Free Download

A data security policy is an organization's set of guidelines and rules for managing and protecting its data assets. Learn what goes into a data security policy, how to implement one, and best practices in this new blog.
Blog

Data Classification Best Practices: Strategies & Compliance

Not every organization can afford to engage in a data arms race to remain competitive in the data-hungry era of generative AI and large language models. However, embracing data classification best practices is a cost-effective way to get the desired outcomes from your data, highlighting its important value, risk sensitivity, and compliance requirements. Data classification best practices involve a...
Blog

Managing the Rising Tide of CVEs 

If you are watching recent security stats, you’ll likely spot an alarming trend. Common Vulnerabilities and Exposures (CVEs) are on the rise and expected to increase by 25% in 2024, reaching 2,900 CVEs per month¹. It’s not a huge surprise that the number of known vulnerabilities is growing, given the proliferation of systems and software. Unfortunately, average time to remediation is increasing...
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

What Is Data Management? Strategies & Best Practices

Organizations must collect and manage data effectively to remain competitive in today’s digital world. Data management is a vital area of enterprise management, with good practices necessary for regulatory compliance, business intelligence, and competitive advantage.What Is Data Management?Data management refers to the process of collecting, storing, organizing, and using data efficiently,...
Blog

3 Key Takeaways from AWS re:Inforce 2024

Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog

Patch Tuesday Update July 2024

The first thing that everyone’s going to talk about this month is SQL Server. More than a quarter of the CVEs assigned by Microsoft this month describe SQL Server vulnerabilities. Thankfully, none of them are critical based on their CVSS scores and they’re all listed as “Exploitation Less Likely.”
Vulnerability Research

Patch Tuesday Update - July 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.46.0 and FVM Agent 2.9 releases.Microsoft addressed 142 vulnerabilities in this release, including 5 rated as critical, and 59 remote code execution vulnerabilities.This release represents a huge increase in the number of CVEs, as opposed to last month’s count.Notable Vulnerabilities from this patch Tuesday release:CVE-2024...
Blog

What Is Data Privacy? Top Risks & Best Practices

Data privacy, or information privacy, concerns IT's aspect involving control over data sharing by individuals or organizations. Read this post to learn more about why data privacy is important, along with best practices to strengthen data privacy.
Blog

Data Classification Levels Explained: Enhance Data Security

Data classification levels have various use cases in businesses and governmental institutions. They define how data should be handled based on sensitivity and importance, allowing for more effective and secure data management.What Are Data Classification Levels?Data classification levels are categories used to organize data based on its sensitivity, confidentiality, and potential impact should it...