Blog

Blog

Your 5-Minute CUI Training Study Guide

Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog

7 Cybersecurity Resolutions For 2022

It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog

Apache Log4j2 Security Advisory

Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Vulnerability Research

Apache Log4j2 Security Advisory

Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...
Blog

Infographic: Best Coding Practices for Secure Web Applications

Keeping your organization protected from web application vulnerabilities doesn't have to be complicated. There are some best secure coding practices that you can follow to ensure that you're protecting your customers and preventing cyber criminals from damaging your company. ...
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog

Why Risk-Based Vulnerability Management is More Vital Than Ever

In the modern world, cybersecurity is no longer a fringe concern reserved for larger organizations. Companies of all sizes in every industry are on high alert, given cyber attacks know no bounds. As attack vectors expand and vulnerabilities increase, vulnerability management has risen to the forefront of security solutions to help organizations shore up network and application security...
Blog

Top Cybersecurity Pain Points Facing Credit Unions and How to Address Them

Credit Union Cybersecurity Pain PointsAccording to Federal Reserve Chairman Jerome Powell, cyberattacks are one of the greatest risks to our global financial system. These risks have only increased as online financial transactions rise. For credit union cybersecurity, this means the effort required to protect member data is increasing and growing even more challenging.Direct attacks on credit...
Blog

The Terrifying Truth About Ransomware

Headlines are screaming with ransomware attacks and the ever-increasing payout demands. In May, Colonial Pipeline fell under a substantial ransomware attack that shut down production along the East coast, affecting oil prices worldwide. Colonial Pipeline disclosed they paid out $4.4 Million in Bitcoin to restore files because they could not recover quickly enough otherwise.Ransomware’s Terrifying...