Blog

Blog

Fortra VM 7.0.3 Release

The Fortra VM 7.0.3 release is now live.  In this release there is a new Standard Scan feature. New Standard ScanFortra VM Release 7.0.3 introduces a new Standard Scan option. This Standard Scan feature provides an initial preset option that pre-selects the most widely used VM scan settings. Standard mode allows users to get a scan up and running in just a few clicks, without having to go...
Blog

What is POPIA, and How Do You Achieve Compliance?

POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog looks at the purpose of the law, POPIA compliance best practices, and more.
Vulnerability Research

Patch Tuesday Update - September 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.50.0 and FVM Agent 2.11 releases.Microsoft addressed 79 vulnerabilities in this release, including 7 rated as Critical and 23 Remote Code Execution vulnerabilities.This release also includes fixes for four vulnerabilities that have been exploited in the wild.CVE-2024-38217 and CVE-2024-38226 are Security Feature Bypass...
Blog

What Are External Security Threats in Cybersecurity?

According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name...
Blog

An Overview of Endpoint Detection and Response (EDR)

EDR, or endpoint detection and response, is a cybersecurity technology that monitors and collects data from endpoints to detect, analyze, investigate, and respond to cybersecurity threats. Learn more about EDR and how it can help organizations in this blog.
Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.