Blog

Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and if one should come...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum...
Blog

Getting Ahead of Cybersecurity Regulation Offers a Competitive Advantage

As cybercrime continues to skyrocket (security incidents 124% year over year) and headlines are still dominated by high-profile cybersecurity issues ( SolarWinds, Colonial Pipeline, Log4j) the government has become keenly interested in regulating how businesses protect their data and assets. This desire to regulate applies not only to those engaging in business with the federal government but to...
Blog

Your 5-Minute CUI Training Study Guide

Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog

7 Cybersecurity Resolutions For 2022

It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...
Blog

Top Benefits of Cloud-Based Access Control

Cloud-based access control is a way to remotely control who has access to your company’s documents, data, and information. The controls can be changed from anywhere and can be gated quickly because of the cloud-based nature.The fundamental purpose of access control is to prevent unauthorized access to an environment with valued resources. An access control system, whether it’s based locally or on...
Blog

Apache Log4j2 Security Advisory

Details on the disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228).Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log messages and parameters to protect against attacker controller LDAP servers and other endpoints. A...
Vulnerability Research

Apache Log4j2 Security Advisory

Apache Log4j2 Security AdvisoryDigital Defense by Fortra's Vulnerability Research Team (VRT) is aware of a recently disclosed security issue related to the open-source Apache “Log4j2” utility (CVE-2021-44228). Log4j is a logging framework found in Java software. The flaw is tied to a failure by certain features in the Java Naming and Directory Interface (JNDI) which is used in configuration, log...