Blog

Blog

Fortra Patch Priority Index for December 2025

Fortra's December 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google.Up first on the list are patches for Microsoft Edge (Chromium-based) that resolve 13 type confusion, inappropriate implementation, and use after free vulnerabilities.Next on the list are patches for Microsoft Office, Word, Access, Outlook and Excel. These patches resolve 13 remote...
Blog

BEC Global Insights Report: December 2025

This report from Fortra Intelligence & Research Experts (FIRE) outlines key BEC trends for December 2025 based on active defense engagements. Findings include a 1% increase in overall attack volume compared to November, with gift cards as the leading cash-out method (52.8%) and Apple Store cards being most requested (50%).
Blog

WEF: AI Overtakes Ransomware as Fastest-Growing Cyber Risk

We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today.That's not just my opinion, that's also the message that comes loud and clear from the World Economic Forum's newly-published "Global Cybersecurity Outlook 2026." As the report bluntly...
Blog

Data Classification Methods: Ensuring Security and Compliance

Data classification methods are techniques used to organize and categorize data into various distinct classes or groups. These methods are essential for numerous applications, such as data analysis and machine learning, as well as data security, data management, and regulatory compliance.What Is Data Classification?Data classification is the process of organizing and categorizing data into...
Blog

6 Areas Turning Cyber Compliance from Checkboxes to Proof

A new year often brings a wave of updated cybersecurity compliance requirements. In 2026, regulators are raising the bar. “Check-the-box” compliance that may once have been sufficient to pass audits is no longer enough. Today’s mandates increasingly demand evidence: proof that controls are operating as designed, faster incident reporting, and broader disclosure obligations across vendors, systems,...
Blog

January 2026 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s January 2026 Security Updates. The FIRE team is actively working on coverage for these vulnerabilities and expect to ship that coverage as soon as it is completed.
Blog

Human Error Meets Data Exposure: The Breach Vector No One Talks About

Human error now plays a role in 95 percent of data breaches, making it more critical than ever for security teams to treat it as the substantial threat it is. In some cases, employees intentionally expose sensitive data for personal gain. But the most pervasive insider threats aren’t malicious — they’re accidental. This challenges the notion that an organization can become invulnerable if only it...
Blog

What is Data Security Posture Management (DSPM)?

Cyber attacks are on the rise. In 2023, a PWC survey revealed an almost 10% increase in data breaches that resulted in over $1 million in damages. Threat actors are constantly adapting their techniques to stay one step ahead, and organizations need all the help they can get to protect their infrastructure from the threat of intrusion.Data security posture management (DSPM) is an essential tool in...
Blog

What are Cloud Misconfigurations?

As we use more cloud applications, it’s become harder to maintain and control our multi-cloud environments. Because of this increasing complexity, configuration errors are becoming increasingly common; Gartner says that 99% of cloud security failures will be caused by misconfiguration. To prevent breaches caused by cloud misconfigurations, organizations rely on cloud data security solutions....
Blog

Data Classification Schema: Best Data Handling Strategies

An organization must define how it classifies its data set so it can take the necessary measures to protect them effectively. Since all data isn’t created equal, data classification enhances this by highlighting the sensitivity levels.What Is a Data Classification Schema?A data classification schema is a framework or structure that organizes and categorizes data into different classes or...
Blog

The Autonomy Paradox: Why Smarter AI Agents Are Harder to Secure

Agentic AI systems are designed for autonomy, but autonomy changes everything. These aren’t traditional vulnerabilities or software bugs; they’re design-level weaknesses where decision logic, data context, and control boundaries collide. And after a year of watching real agents drift, loop, and improvise in production, one thing’s clear: intelligence without constraint isn’t progress, it’s risk...
Blog

Automated Data Classification: What It Is and How It Works

Automated data classification uses technology and algorithms to categorize and sort data automatically based on predefined criteria. The technology scans various data sets and accurately labels them according to their sensitivity and importance.This is a significant improvement over manual classification, as it is more efficient, less time-consuming,...
Blog

The Real Cost of Data Sprawl: Why Discovery Isn’t Enough

Data sprawl, the uncontrolled proliferation of data across cloud platforms, collaboration tools, and devices, is creating unprecedented challenges for organizations. As organizations generate and store ever-increasing volumes of unstructured data, every new file, workspace, or database adds complexity, multiplies exposure points, and increases the likelihood of sensitive information slipping...
Blog

Data Classification Levels Explained: Enhance Data Security

Data classification levels have various use cases in businesses and governmental institutions. They define how data should be handled based on sensitivity and importance, allowing for more effective and secure data management.What Are Data Classification Levels?Data classification levels are categories used to organize data based on its sensitivity, confidentiality, and potential impact should it...
Blog

Getting to know Errol Weiss: CSO at Health-ISAC

We recently sat down with Errol Weiss, Chief Security Officer (CSO) at Health-ISAC to better understand the challenges, excitements, and concerns facing executive-level security leaders: in healthcare and across the board. We discussed subjects including prescriptively preventing burnout, the largely untapped value in sharing threat intelligence, and closing the security loop so CISOs can sleep at...