Blog

Blog

Learning Cyber Defense Strategies from Stratego Strategy

I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog

Vulnerability Research Team Shares Details Regarding Recent Zero-Day Discoveries

Today Fortra is publishing several high-impact vulnerabilities on the Dell SonicWall GMS platform that our vulnerability research team discovered and brought to the attention of Dell. Dell has been extremely professional and worked diligently with Fortra engineering staff to understand, resolve and verify the fixes for these security issues. Dell has released fixes and customer advisories for...
Blog

6 Ways to Keep Your Kids Safe Online

As children are increasingly targeted in online attacks, parents must take steps to instill secure computing habits and protect their kids' devices. Here are 6 tips for keeping your kids safe online.
Blog

The Third Party Data Breach Problem

Data breaches via third parties are a growing problem impacting companies across many industries – and one that can be even more difficult to defend against. How can companies secure their assets against cyber attacks that target suppliers and partners or use information stolen in previous breaches?
Blog

Six considerations for mitigating risk in IoT devices

IoT has already developed a reputation for poor security. As connected devices become more engrained in our day to day business and personal lives, producers of IoT technology should follow these six tips to shore up IoT security.
Blog

What Is Queuing Theory?

Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Blog

What is FTP Security? Securing FTP Usage

File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.