Blog

Blog

Source Code Security Best Practices to Protect Against Theft

In many ways, source code is the backbone of the internet. Today's blog looks at source code security best practices that organizations need to follow, like using encryption and code analysis, to ensure its protected from theft and improper handling by employees.
Blog

How to Combat Executive Impersonation on Social Media

Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks...
Blog

A Guide to Enterprise Data Protection Best Practices

For most crafts, following best practices can help form a strong foundation. Enterprises looking to embrace data protection best practices should consider the following methods to ensure data - both company and user - is kept safe and secure.
Blog

Cybercriminal Focus in the New Year – Top Threat Trends

Cybercriminals are constantly refining their tactics to improve deliverability and increase the success of their campaigns. While email phishing remains one of the most persistent threats to organizations, many attacks now begin outside the inbox, using non-traditional lures or targeting users on platforms where they are more likely to engage.For security teams, keeping pace with where threats...
Vulnerability Research

Patch Tuesday Update - January 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.34.0 and Agent 2.3 releases.Microsoft addressed 49 vulnerabilities in this release, including 2 rated as Critical and 12 Remote Code Execution vulnerabilities.CVE/AdvisoryTitleTagMicrosoft Severity RatingBase ScoreMicrosoft ImpactExploitedPublicly DisclosedCVE-2024-20666BitLocker Security Feature Bypass VulnerabilityWindows...
Blog

ENISA’s New Report Highlights Cyber Investments and Pushes Vulnerability Management

This past November, the European Union Agency for Cybersecurity (ENISA) released its NIS Investments Report 2023, a rundown of how critical EU operators have been investing in cybersecurity pursuant to the NIS Directive. It not only covers how dollars have been spent, but suggest how they ought to be going forward. One particular point of emphasis? Vulnerability management. Vulnerability...
Blog

Data Scanning: How to Protect Sensitive & Confidential Data

Being able to scan your data can give you the full scope of where files exist and what needs to be properly secured. In this blog, we break down why it's a key part of data loss prevention, who uses data scanning, and why it's important.
Blog

Create Chaos to Engineer Security Testing

What is Chaos Testing?Application chaos testing does its best to counteract Murphy’s Law, where anything that can go wrong will go wrong, and at the worst possible time.Chaos testing and engineering is a proactive test methodology that identifies system errors prone to misuse before they can cause damage and security concerns for an application. This style of testing was developed and made...
Blog

Top Data Vulnerabilities that Cause Data Loss

In this blog we take a high level look at some of the vulnerabilities or flaws in a system that can lead to data loss, the stages of exploiting a vulnerability, the impact, and how to best safeguard your data against vulnerabilities.