Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
What's the Biggest Healthcare Security Threat for 2021 And Beyond?
By Cybersecurity Experts at Fortra on Mon, 11/22/2021
We asked 21 cybersecurity experts and healthcare executives what the biggest security threat they're facing in 2021 and beyond is.
Blog
Top 6 Data Security Challenges and How to Address Them
By Scott Messick on Tue, 11/16/2021
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Rather than cobble together a piecemeal solution strategy, rely on trusted, integrated, and scalable data security solutions.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
Four Ways Intermapper Supports Regulatory Compliance and Auditor Requirements
By Kevin Jackson on Thu, 11/04/2021
Complying with cybersecurity mandates like HIPAA, SOX, PCI-DSS, NIST or CMMC is challenging. But proving your organization is compliant can be even more difficult. Discover how Intermapper offers leading network monitoring, mapping, and alerting tools that can help you meet regulatory requirements and prepare for compliance audits.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Why Risk-Based Vulnerability Management is More Vital Than Ever
Fri, 10/29/2021
In the modern world, cybersecurity is no longer a fringe concern reserved for larger organizations. Companies of all sizes in every industry are on high alert, given cyber attacks know no bounds. As attack vectors expand and vulnerabilities increase, vulnerability management has risen to the forefront of security solutions to help organizations shore up network and application security...
Blog
Top Cybersecurity Pain Points Facing Credit Unions and How to Address Them
By Mieng Lim on Thu, 10/28/2021
Credit Union Cybersecurity Pain PointsAccording to Federal Reserve Chairman Jerome Powell, cyberattacks are one of the greatest risks to our global financial system. These risks have only increased as online financial transactions rise. For credit union cybersecurity, this means the effort required to protect member data is increasing and growing even more challenging.Direct attacks on credit...
Blog
The Terrifying Truth About Ransomware
Wed, 10/27/2021
Headlines are screaming with ransomware attacks and the ever-increasing payout demands. In May, Colonial Pipeline fell under a substantial ransomware attack that shut down production along the East coast, affecting oil prices worldwide. Colonial Pipeline disclosed they paid out $4.4 Million in Bitcoin to restore files because they could not recover quickly enough otherwise.Ransomware’s Terrifying...
Blog
Data Classification: The Cornerstone of Regulatory Compliance
Tue, 10/26/2021
The primary reason most organizations look at classifying the data they create and handle is to control access to sensitive information, driven by the need to manage security risk, and comply with data protection regulations such as GDPR, CCPA, ITAR, and more.All organizations have to comply with the rules of their industry bodies, as well as the...
Blog
Cybersecurity Talent Gap Shrinks to 2.72 Million Individuals
Tue, 10/26/2021
A new report suggests the job market saw 700,000 new cybersecurity professionals since 2020. While the number is an improvement, the gap continues to outpace what’s needed.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
How Threat Scanning Amplifies Endpoint Protection
Thu, 10/07/2021
If you find yourself concerned about your organization’s current cybersecurity efforts, you’re not alone. According to Yahoo.com, nearly four out of five executives lack confidence in their current cybersecurity posture. In response, 91% of these companies are increasing their cybersecurity spending in 2021.If upping your IT budget is not one of your top priorities, it’s crucial to consider the...
Blog
New Automotive Cybersecurity Standards Require SAST and DAST Solutions
Wed, 10/06/2021
In the last decade, there have been 633 automotive cybersecurity incidents. Yet, this year at Black Hat, the automobile industry was able to breathe a momentary sigh of relief when a connected vehicle was presented as a hacking challenge, and no one succeeded. This stood in stark contrast to 2015 when researchers demonstrated the real danger of automotive cyber-attacks by hijacking a jeep remotely...
Blog
Fake Mobile Apps Leave Users Vulnerable, Damage Brands
Tue, 10/05/2021
Fake mobile apps are more sophisticated and more dangerous than ever. Cloned and spoofed mobile applications flood both official and third-party app stores, exploiting brand trust to trick users into downloading malware. These imposters don’t just erode brand equity; they expose users to serious data breaches. And with mobile users often skipping basic security precautions, the risk of compromise...
Blog
A Smarter Vulnerability Management Solution for Credit Unions
Fri, 09/24/2021
As the years go by, cyber attackers have regularly shifted their targets. In doing so, they have honed their craft to carry out attacks in a much more sophisticated manner. Unfortunately, this has transitioned focus from relatively smaller scams targeting individuals, to full scale heists on institutions in the hopes of a much larger payout. Financial institutions are at the top of the list, being...
Blog
IoT Security 101
Thu, 09/23/2021
The COVID-19 pandemic left its indelible mark across our society. Our work, recreation, healthcare, and even grocery shopping became remote, digital, and reliant on the internet. The eruption of new apps and Internet of Things (IoT) devices proved a tempting target for cyber attackers; that brought security issues new and old to the fore.IoT Devices are EverywhereIoT device use was expanding even...
Blog
Top 10 TLDs Abused
Tue, 09/14/2021
Domains remain one of the most exploited tools in the hands of threat actors, fueling phishing schemes and victim manipulation. In our latest Quarterly Threat Trends & Intelligence Report, we uncover how attackers are weaponizing Legacy Generic (gTLD) and Country Code (ccTLD) top-level domains — along with HTTPS and free security certificates — to infiltrate and target enterprises. Top-level...
Blog
Jury Convicts Ex-Employee in Tech Trade Secret Theft Case
Mon, 09/13/2021
The gears of the American court system continued to grind throughout the COVID-19 pandemic, just slower for some than others.For instance, it took nearly 10 years but one of the bigger tech trade secret theft stories of the last decade saw a conviction late last month when a former employee at a California tech company was found guilty of possession of stolen trade secrets, in this case...