Blog

Blog

The Security Paradox of Open Source Tools

The start of a new year is always a good time to take stock. In cybersecurity, one perennial problem - the persistence of “vintage” open source vulnerabilities like Heartbleed and Shellshock – should force us to ask some hard questions. Why do so many vulnerabilities persist in Open Source (OS) tools, and how do we fix the problem? In theory, OS tools should be more secure. In practice, it hasn’t...
Blog

Data Classification & Management Policy [Free Download]

Company-wide policies require documents that articulate and clarify how organizations want processes implemented. A data classification policy template is a pattern used to specify predefined rules to ensure an organization’s data is systematically protected.
Blog

AI is Changing the Attack Surface - Security Must Innovate

Security needs to be reevaluated in the context of AI, but not everything needs to change at once. Organizations that take a measured approach will do better, not giving into the AI hype cycle but recognizing the strategic ways AI is changing the game — and the ways it is changing security trajectories for the better.AI Is Weakening DefensesAI-enabled attacks are increasing, weakening existing...
Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Blog

Top Ways Employees Make Their Employers Vulnerable

The people factor is still the biggest variable in cyber resilience. Firewalls, EDR, and Zero Trust help, but everyday choices shape outcomes. The top ways employees make their employer vulnerable often come down to habits formed under pressure: clicking quickly, sharing widely, and trusting implicitly. Understanding those patterns — and changing them at scale — requires focusing on human risk...
Blog

PII Data Classification: 4 Best Practices

Getting personally identifiable information (PII) classification right is one of the first steps to having an effective data protection strategy. We break down four best practices in this blog.
Blog

What Is a Health Information System?

Learn what a health information system (HIS) is and how they're key to managing healthcare data, along with HIS benefits, best practices, and more.
Blog

Hacking Attack Leaves Russian Car Owners Locked Out of Their Vehicles

Imagine the scene. It's a cold Monday morning in Moscow. You walk out to your car, coffee in hand, ready to face the day. You press the button to unlock your car, and ... nothing happens. You try again. Still nothing. The alarm starts blaring. You can't turn it off.Welcome to Monday 26 January, 2026, and the chaos that was caused by a cyberattack on Delta - a Russian company that provides smart...
Blog

Data Classification Best Practices: Strategies & Compliance

Not every organization can afford to engage in a data arms race to remain competitive in the data-hungry era of generative AI and large language models. However, embracing data classification best practices is a cost-effective way to get the desired outcomes from your data, highlighting its important value, risk sensitivity, and compliance requirements. Data classification best practices involve a...
Blog

SEO Poisoning Marketplace Topping Search Results, Impersonating Top Financial Institutions

Introduction to the HaxorSEO MarketplaceFortra Intelligence and Research Experts (FIRE) have uncovered a group of active malicious threat actors operating since 2020. The group refers to themselves as Haxor, a slang word for hackers, and their marketplace as HxSEO, or HaxorSEO. HxSEO has established its primary base of operations and marketplace on Telegram and WhatsApp. HxSEO stands out for...