Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Wed, 02/16/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection.
Q: What mix of technologies do you see as being the optimum...
Blog
Getting Ahead of Cybersecurity Regulation Offers a Competitive Advantage
Tue, 02/15/2022
As cybercrime continues to skyrocket (security incidents 124% year over year) and headlines are still dominated by high-profile cybersecurity issues ( SolarWinds, Colonial Pipeline, Log4j) the government has become keenly interested in regulating how businesses protect their data and assets. This desire to regulate applies not only to those engaging in business with the federal government but to...
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022
Blog
10 Best Tips to Improve Your Data Security Plan
Thu, 02/10/2022
Follow these 10 tips to help create a comprehensive data security plan for your organization or improve your existing plan.
Blog
How and Why to Implement Zero Trust Architecture via Layered Security
Wed, 02/02/2022
Perimeter-based security is out, Zero Trust architecture is in. Learn what Zero Trust means, why your organization should use it, and how Fortra can help.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Blog
Your 5-Minute CUI Training Study Guide
Fri, 01/28/2022
Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog
Getting Started with PCI and Why Every Company Should Be in Compliance
By Robin Tatam on Mon, 01/24/2022
Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!
Blog
7 Cybersecurity Resolutions For 2022
Fri, 01/14/2022
It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog
Choosing the Right Data Security Solution
By Nick Hogg on Fri, 01/14/2022
Fortra goal is to help you make the best choices for your organization. Find the best data security solutions for you by asking yourself these 5 questions.
Blog
Cyber Insurance: How It Works and Why Every Organization Needs It
Fri, 01/07/2022
When a cybersecurity strategy isn't quite enough, cyber insurance may be the next best step to fight against cybercrime. Here's why every organization needs it.
Blog
60+ IBM i User Groups and Communities to Join
By Tom Huntington on Thu, 12/16/2021
To help you stay connected to the thriving IBM i community, we’ve compiled a comprehensive list of IBM i user groups around the world. Read on!
Blog
Apache Log4j2 Security Advisory
By Mieng Lim on Thu, 12/16/2021
Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Vulnerability Research
Apache Log4j2 Security Advisory
Mon, 12/13/2021
Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...
Blog
What Does Ansible Mean for IBM i Automation?
By Tom Huntington on Mon, 12/06/2021
Ansible is good for the IBM i platform as it provides additional automation around burdensome IT tasks. Learn more here.
Blog
Infographic: Best Coding Practices for Secure Web Applications
Thu, 12/02/2021
Keeping your organization protected from web application vulnerabilities doesn't have to be complicated. There are some best secure coding practices that you can follow to ensure that you're protecting your customers and preventing cyber criminals from damaging your company.
...
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.