Blog

Blog

What To Look for in a HIPAA-Compliant Email Provider

Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.
Vulnerability Research

Patch Tuesday Update - June 2023

Today’s Microsoft Security Update addressed 78 vulnerabilities, including 6 that are rated as Critical. None of the vulnerabilities included in the Patch Tuesday release appear to be currently exploited in the wild.Of note, Microsoft SharePoint Server Elevation of Privilege Vulnerability (CVE-2023-29357) appears to allow an attacker to bypass authentication using a spoofed JWT authentication token...
Blog

Fortra VM 6.5.4 Updates

Every release helps update and pave the way for additional features and improvements. Based off of user feedback, here are the recent updates for Fortra VM (formerly Frontline VM).Linux AgentScan Linux assets that are not always connected to the network during normal network-based scan. Install and configure a schedule for Agents to check-in after the initial baseline scan is completed. Agents...
Blog

How Enterprise VM Keeps Up with Modern Threats

Vulnerability management is known for being a foundational cybersecurity practice. While open-source VM solutions have perhaps provided an introduction to the benefits of VM, the modern threat landscape makes it so organizations need more advanced and reliable tools to stay secure. Here’s why enterprise grade VM solutions are more essential now than ever. Beating complexity with technology...
Blog

Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy

Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog

What Is Intellectual Property Infringement?

Intellectual property is one of the cornerstones of modern capitalism. It encourages entrepreneurial risk-taking by ensuring individuals, organizations, and businesses reap the rewards of their creative ingenuity.
Blog

Key Insights for Zero Trust in 2023

With the release of the 2023 Zero Trust Security Report, it’s a good time to reflect on the seismic shifts that have happened in the industry regarding network security. Discover key insights and impacts of Zero Trust in 2023.
Blog

Security Awareness: The Groundwork of Cybersecurity Culture

It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not.Criminal hackers go after the low...