Blog

Blog

Better Enterprise Security Through Forced Quarantine

This article was originally published on TechAeris on May 08, 2020.What do you do if a small infected minority is threatening to infect the rest? By now, there probably isn’t a human being on the planet that doesn’t know the answer to this question: you place the infected in quarantine, separating them from the healthy. Collectively, throughout the world, we are distancing ourselves from the...
Blog

Why Ignoring Web Application Security Can Be Costly

It’s easy to forget how dramatically the delivery of tech tools has changed over the decades. These days, few of us depend on a long list of desktop apps to do our work. Instead, we spend our working day logged into several web apps - simultaneously.Likewise, we can miss just how complex and interconnected the web app ecosystem is. Think you’re just using a single web app provided by a single...
Blog

Security GPA®: Making the Grade with Risk-Based Prioritization

Security GPA is one the most-used, and most-loved features in Fortra Vulnerability Management platform. Designed for risk prioritization, Security GPA is predicated upon a simple metric that resonates across all levels of an organization. Based on the academic grading system that uses both a four-point numerical scale in tandem with the letter grades A-F, Security GPA has grown into a powerful and...
Blog

3 Ways Peer Insight Illustrates Cybersecurity Performance

Cybersecurity is now a business requirement for most organizations. However, it’s often difficult to report on your security team’s performance to non-technical stakeholders and leadership. Senior leaders deal with conflicting priorities across the entire business. Therefore, it’s crucial to communicate the risks to your organization in a way that resonates.Vulnerability management is one of the...
Blog

Top 10 Tips to Improve Web Application Security

Web applications are exposed. Unlike internal network applications, everyone can get to a web application; all they need is an internet connection. That includes hackers too. In fact, an automated tool may be attacking the web applications you depend on as you read this article.But developers often overlook web application security. Teams frequently spend all their energy on the code, the visual...
Blog

Everything You Need to Know About Web Security

Last updated on April 24, 2020.Web security, your site and your networkWeb sites are unfortunately prone to security risks. And so are any networks in which web servers are connected. Setting aside risks created by employee use or misuse of network resources, your web server and the site it hosts present your most serious sources of security risk.Web servers by design open a window between your...
Blog

What Not to Do for IBM i Disaster Recovery

It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Blog

Defuzzing API Testing: The Search for Vulnerabilities

REST APIs have allowed us to create modern web and mobile applications; By using the power of an API, we can open up the world of services – pulling in data and sharing information and oiling the wheels of the internet.But building an API-enabled service also means that you potentially open up your web or mobile application to cybercriminals.In the first nine months of 2019, 7.9 billion data...
Blog

Information Security Goes Non-Binary

This article was originally published on HelpNetSecurity on April 16, 2020.Finding security holes in information systems is as old as the first commercially available computer. Back when a “computer” was something that sat in a computer room, users would try to bypass restrictions, sometimes simply by trying to guess the administrator’s password.Later when Bulletin Board Systems (the primitive...
Blog

Is Automation the Future of Pen Testing?

This article was originally published on Enterprise Management 360 on March 31, 2020.Penetration testing is the Marmite of cybersecurity: you either love it or you hate it. Taking a neutral stance on the matter, it’s easy to see both sides. On one hand, pen testing provides indisputable evidence of vulnerabilities for organisations to action. Pen testers are also often able to identify even the...
Blog

Common Excuses for Not Automating

Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog

How to Manage Employees Devices Properly: Employee Device Management

Across the world, companies like Google, Microsoft, Amazon, Twitter, and yes, Fortra, have asked their employees to work from home in response to the Coronavirus (Covid-19) pandemic. As employees move from on-premises offices to their homes, businesses will be faced with the challenge of managing and securing both company-owned and employee-owned devices as they access company resources from...