Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?
Thu, 02/17/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and if one should come...
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Wed, 02/16/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection.
Q: What mix of technologies do you see as being the optimum...
Blog
Getting Ahead of Cybersecurity Regulation Offers a Competitive Advantage
Tue, 02/15/2022
As cybercrime continues to skyrocket (security incidents 124% year over year) and headlines are still dominated by high-profile cybersecurity issues ( SolarWinds, Colonial Pipeline, Log4j) the government has become keenly interested in regulating how businesses protect their data and assets. This desire to regulate applies not only to those engaging in business with the federal government but to...
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022
Blog
10 Best Tips to Improve Your Data Security Plan
Thu, 02/10/2022
Follow these 10 tips to help create a comprehensive data security plan for your organization or improve your existing plan.
Blog
A Cyber NTSB: DHS Announces Cyber Review Board
Thu, 02/03/2022
The board will investigate breaches and vulnerabilities to find out why they happened and how to prevent them from happening again.
Blog
How and Why to Implement Zero Trust Architecture via Layered Security
Wed, 02/02/2022
Perimeter-based security is out, Zero Trust architecture is in. Learn what Zero Trust means, why your organization should use it, and how Fortra can help.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Blog
Your 5-Minute CUI Training Study Guide
Fri, 01/28/2022
Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog
7 Cybersecurity Resolutions For 2022
Fri, 01/14/2022
It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog
Choosing the Right Data Security Solution
By Nick Hogg on Fri, 01/14/2022
Fortra goal is to help you make the best choices for your organization. Find the best data security solutions for you by asking yourself these 5 questions.
Blog
Top Benefits of Cloud-Based Access Control
By Cybersecurity Experts at Fortra on Thu, 01/13/2022
Cloud-based access control is a way to remotely control who has access to your company’s documents, data, and information. The controls can be changed from anywhere and can be gated quickly because of the cloud-based nature.The fundamental purpose of access control is to prevent unauthorized access to an environment with valued resources. An access control system, whether it’s based locally or on...
Blog
Cyber Insurance: How It Works and Why Every Organization Needs It
Fri, 01/07/2022
When a cybersecurity strategy isn't quite enough, cyber insurance may be the next best step to fight against cybercrime. Here's why every organization needs it.
Blog
Top Tips for Preventing BEC Scams
By Cybersecurity Experts at Fortra on Wed, 01/05/2022
Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.
Blog
Insider Threat: Definition & Examples
By Cybersecurity Experts at Fortra on Tue, 12/28/2021
A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.
Blog
Apache Log4j2 Security Advisory
By Mieng Lim on Thu, 12/16/2021
Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Blog
IP Theft: Definition and Examples
By Cybersecurity Experts at Fortra on Tue, 12/14/2021
IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
Vulnerability Research
Apache Log4j2 Security Advisory
Mon, 12/13/2021
Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...