Blog

Blog

Eight Ways to Avoid Becoming Phish Bait

Is your organization capable of defending against today’s phishing attacks? Social Engineering requires very little to no knowledge of information technology or cutting-edge applications. All an attacker needs is a target and a crafty email to prey on weaknesses in human behavior.Don’t Take the Bait! Tips to Help Defend Against a Phishing AttackBe suspicious of emails asking you to “verify” your...
Blog

Creating an Incident Response Classification Framework

Part 4 of our Field Guide to Incident Response series outlines a two-tiered framework for classifying security incidents to enable more efficient incident prioritization and response. This video clip is taken from our webinar, Incident Responder's Field Guide - Lessons from a Fortune 100 Incident Responder. Feel free to watch the full webinar here.
Blog

Veritas InfoScale Operations Manager Vulnerabilities

Today, Fortra is publishing two zero-day vulnerabilities found in the Veritas InfoScale Operations Manager that our vulnerability research team discovered and brought to the attention of Veritas. Veritas has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Veritas has released fixes for...
Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least. And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company...
Blog

Learning Cyber Defense Strategies from Stratego Strategy

I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog

Vulnerability Research Team Shares Details Regarding Recent Zero-Day Discoveries

Today Fortra is publishing several high-impact vulnerabilities on the Dell SonicWall GMS platform that our vulnerability research team discovered and brought to the attention of Dell. Dell has been extremely professional and worked diligently with Fortra engineering staff to understand, resolve and verify the fixes for these security issues. Dell has released fixes and customer advisories for...
Blog

Benefits Of Email Classification Software

Email classification software gives businesses the ability to classify emails in accordance with their sensitivity. This ensures that you have better control over data, and that confidential information is only shared with intended recipients. Read on to discover more about the benefits of such software in further detail.Assess your company’s level of...
Blog

6 Ways to Keep Your Kids Safe Online

As children are increasingly targeted in online attacks, parents must take steps to instill secure computing habits and protect their kids' devices. Here are 6 tips for keeping your kids safe online.