Blog

Blog

VRT Zero-day Security Advisory

VRT Zero-day Security AdvisoryFortra Infrastructure Protection brands, Digital Defense and Beyond Security are actively monitoring the disclosure of a security issue affecting a widely used Java Framework called “Spring4Shell” or “SpringShell” which has been assigned CVE-2022-22965.The Spring framework allows Java developers to develop Java applications easily with enterprise-level components. A...
Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog

The Most Dangerous Cyberattacks Aren’t What You Expect

In 2022 Cyber Criminals Continue to Recycle Malware. Don’t Fall Prey to Outdated Attacks.It’s a known fact that cyberattacks are on the rise, but not because innovative criminals are executing new strategies or deploying novel attacks. Ironically, cyberattackers are doing what many good business people do — building off what already works. This explains why 75% of attacks utilize two years or...
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core values, and Fortra acquired Sourcio in April 2016.
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum...
Blog

Getting Ahead of Cybersecurity Regulation Offers a Competitive Advantage

As cybercrime continues to skyrocket (security incidents 124% year over year) and headlines are still dominated by high-profile cybersecurity issues ( SolarWinds, Colonial Pipeline, Log4j) the government has become keenly interested in regulating how businesses protect their data and assets. This desire to regulate applies not only to those engaging in business with the federal government but to...
Blog

Your 5-Minute CUI Training Study Guide

Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Blog

7 Cybersecurity Resolutions For 2022

It's the start of a new year, now's the perfect time to review your cybersecurity goals. Each year cyberthreats increase, causing more and more damage. Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company's security. There are numerous ways your cybersecurity can be strengthened: secured...