Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Top 6 Data Security Challenges and How to Address Them
By Scott Messick on Tue, 11/16/2021
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Rather than cobble together a piecemeal solution strategy, rely on trusted, integrated, and scalable data security solutions.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
Four Ways Intermapper Supports Regulatory Compliance and Auditor Requirements
By Kevin Jackson on Thu, 11/04/2021
Complying with cybersecurity mandates like HIPAA, SOX, PCI-DSS, NIST or CMMC is challenging. But proving your organization is compliant can be even more difficult. Discover how Intermapper offers leading network monitoring, mapping, and alerting tools that can help you meet regulatory requirements and prepare for compliance audits.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Why Risk-Based Vulnerability Management is More Vital Than Ever
Fri, 10/29/2021
In the modern world, cybersecurity is no longer a fringe concern reserved for larger organizations. Companies of all sizes in every industry are on high alert, given cyber attacks know no bounds. As attack vectors expand and vulnerabilities increase, vulnerability management has risen to the forefront of security solutions to help organizations shore up network and application security...
Blog
Top Cybersecurity Pain Points Facing Credit Unions and How to Address Them
By Mieng Lim on Thu, 10/28/2021
Credit Union Cybersecurity Pain PointsAccording to Federal Reserve Chairman Jerome Powell, cyberattacks are one of the greatest risks to our global financial system. These risks have only increased as online financial transactions rise. For credit union cybersecurity, this means the effort required to protect member data is increasing and growing even more challenging.Direct attacks on credit...
Blog
The Terrifying Truth About Ransomware
Wed, 10/27/2021
Headlines are screaming with ransomware attacks and the ever-increasing payout demands. In May, Colonial Pipeline fell under a substantial ransomware attack that shut down production along the East coast, affecting oil prices worldwide. Colonial Pipeline disclosed they paid out $4.4 Million in Bitcoin to restore files because they could not recover quickly enough otherwise.Ransomware’s Terrifying...
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
How Threat Scanning Amplifies Endpoint Protection
Thu, 10/07/2021
If you find yourself concerned about your organization’s current cybersecurity efforts, you’re not alone. According to Yahoo.com, nearly four out of five executives lack confidence in their current cybersecurity posture. In response, 91% of these companies are increasing their cybersecurity spending in 2021.If upping your IT budget is not one of your top priorities, it’s crucial to consider the...
Blog
New Automotive Cybersecurity Standards Require SAST and DAST Solutions
Wed, 10/06/2021
In the last decade, there have been 633 automotive cybersecurity incidents. Yet, this year at Black Hat, the automobile industry was able to breathe a momentary sigh of relief when a connected vehicle was presented as a hacking challenge, and no one succeeded. This stood in stark contrast to 2015 when researchers demonstrated the real danger of automotive cyber-attacks by hijacking a jeep remotely...
Blog
A Smarter Vulnerability Management Solution for Credit Unions
Fri, 09/24/2021
As the years go by, cyber attackers have regularly shifted their targets. In doing so, they have honed their craft to carry out attacks in a much more sophisticated manner. Unfortunately, this has transitioned focus from relatively smaller scams targeting individuals, to full scale heists on institutions in the hopes of a much larger payout. Financial institutions are at the top of the list, being...
Blog
IoT Security 101
Thu, 09/23/2021
The COVID-19 pandemic left its indelible mark across our society. Our work, recreation, healthcare, and even grocery shopping became remote, digital, and reliant on the internet. The eruption of new apps and Internet of Things (IoT) devices proved a tempting target for cyber attackers; that brought security issues new and old to the fore.IoT Devices are EverywhereIoT device use was expanding even...
Blog
How to Talk to Stakeholders About Cybersecurity
Mon, 09/13/2021
Productive cybersecurity conversations are more critical than ever as vulnerabilities continue to grow every year. Support from business leaders, including the board and C-suite, is essential to building organizational awareness and cultivating cross-divisional partnerships. Unfortunately, communicating about cybersecurity can be a challenge for many IT professionals. Sometimes stakeholders lack...
Blog
Agent-Based vs. Agentless Scanning: Choosing the Right Vulnerability Scanning Method
Fri, 08/27/2021
Preventable AttacksAnother day, another data breach. Cybercrime is on the rise, and the only way to stop a cyberattack is to think like an attacker. In many cases, the bad actor’s first step is scanning the victim’s systems for vulnerabilities that allow them to gain a foothold. According to Forrester’s State of Application Security, 39% of external attacks exploited holes found in web...
Blog
Application Security on a Shoe-String Budget
Tue, 08/17/2021
Boost Your Security Posture Without Breaking Your BudgetHeadlines scream about a new cyberattack every few days, and organizations worldwide scramble to buff their cybersecurity posture. Welcome to the era of high-stakes hacking, and high-profile breaches. No one wants to be the next big news story, but robust cybersecurity comes at a price.You can do everything with a big enough budget. But that...
Blog
Asset Reconciliation: The Best Way To Secure Dynamic Network Assets
By Mieng Lim on Tue, 08/17/2021
CTOs and IT managers are no strangers to risk assessment and the urgent need to keep security frameworks up-to-date and effective. But in recent years, the surge in cloud and hybrid solutions has greatly complicated matters. Additionally, the COVID-19 pandemic brought a frantic shift to remote work, resulting in more scattered and ad-hoc hardware outside of corporate control, among other changes...
Blog
Open PGP for IBM i (iSeries)
Tue, 08/10/2021
GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus.
With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...
Blog
IBM i MFT for Secure FTP and PGP
Tue, 08/10/2021
GoAnywhere MFT will automate and secure file transfers on the IBM i platform using Secure FTP, Open PGP and other popular protocols and encryption standards.
GoAnywhere's IBM MFT can be installed on IBM iSeries - version 7.1 and higher on IBM Power Systems, as well as many other operating systems.
Automates and secures file transfers with trading partners, customers and internal servers
...