Blog

Blog

The Challenge of Securing Bluetooth Technology in Healthcare

It’s the age-old question: when does convenience undermine security? In the healthcare sector, the answer can literally spell the difference between life and death. As the Internet of Medical Things (IoMT) grows, wireless attacks abound. While not any harder to launch than against traditional IoT devices, these attacks are drastically more high-stakes and can use the Bluetooth and related...
Blog

What Is Data Governance? A Quick Guide

The explosion of data and the velocity of its delivery have compelled organizations to incorporate an integrated set of processes, practices, and policies to guide their data use. Data governance ensures there’s a well-defined, company-wide framework that can foster proper data stewardship.
Vulnerability Research

Patch Tuesday Update - April 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.40.0 and FVM Agent 2.6 releases.Microsoft addressed 150 vulnerabilities in this release, including 3 rated as Critical and 67 Remote Code Execution vulnerabilities.This release also includes a fix for the Proxy Driver Spoofing Vulnerability (CVE-2024-26234) that has been exploited in the wild.CVE/AdvisoryTitleTagMicrosoft...