Blog
The Top 4 Cybersecurity Trends of 2015
By Cybersecurity Experts at Fortra on Mon, 09/28/2015
As we near the last quarter of 2015, here’s a look at the four of the year’s top trends in cybersecurity (so far).
Blog
What Is Content Inspection?
Mon, 09/21/2015
Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Blog
How to Hire & Evaluate Managed Security Service Providers (MSSPs)
By Cybersecurity Experts at Fortra on Thu, 09/10/2015
We asked a panel of data security professionals to provide expert recommendations for hiring MSSPs. See what the experts had to say.
Blog
Incident Response Explained: 6 Steps You Need to Know
By Cybersecurity Experts at Fortra on Mon, 08/31/2015
Six steps for effective incident response.
Blog
The Long Goodbye to SSL/Early TLS
Fri, 08/28/2015
If your organization is required to comply with the Payment Card Industry-Data Security Standard (PCI-DSS), particularly Requirement 11, then you are likely familiar with the problems plaguing SSL, early TLS (i.e. TLSv1.0) and their supported ciphers over the past several months. High profile vulnerabilities such as HeartBleed, POODLE, FREAK and LogJam have sent merchants scrambling to patch...
Blog
How Did Ashley Madison Get Hacked?
By Cybersecurity Experts at Fortra on Tue, 08/25/2015
How did Ashley Madison get hacked? Take a look back and relive one of the biggest hacks of 2015, from the first data dump to the CEO resigning, with our updated timeline.
Blog
What is NIST Compliance? (Checklist, Definition, & More)
By Cybersecurity Experts at Fortra on Mon, 08/24/2015
NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high-tech industries today.
Blog
3 Ways to Protect Your Company Against USB Drops
Tue, 08/18/2015
Recently in Arstechnica.com there was an article bringing light to how Windows computers can be exploited when booby-trapped USB fobs are inserted into the machine that then executes malicious code.Microsoft has acknowledged this and released a security bulletin regarding the issue stating, “To exploit the vulnerability, an attacker would have insert a malicious USB device into a target system.”So...
Blog
DDoS as a Cover for Data Theft
By Cybersecurity Experts at Fortra on Tue, 08/11/2015
Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
Blog
How to Protect Your Android Device from the Stagefright Vulnerability
By Cybersecurity Experts at Fortra on Tue, 08/04/2015
The Stagefright vulnerability puts millions of Android users at risks - learn how to protect your Android device from infected text messages.
Blog
Communicating the Data Security Risks of File Sharing & Cloud Storage
By Cybersecurity Experts at Fortra on Wed, 07/22/2015
We asked 34 data security experts how companies can best communicate the security risks associated with file sharing and cloud storage to employees - see what the experts had to say.
Blog
How to Watermark Any File with Digital Guardian Secure Collaboration
By Cybersecurity Experts at Fortra on Tue, 07/14/2015
Whether digital or physical, a watermark is an excellent tool for discouraging counterfeiting and establishing the ownership and veracity of a document.
Blog
ATF Official Caught Leaking Employee Data
By Cybersecurity Experts at Fortra on Tue, 06/30/2015
CNN reports that an executive at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) was sending personnel data to a personal email account.
Blog
What is Cloud Account Hijacking?
By Cybersecurity Experts at Fortra on Mon, 06/15/2015
Learn more about the risks of cloud account hijacking and methods to prevent sensitive data loss in the cloud.
Blog
Are Data Breaches Victimless Crimes?
By Cybersecurity Experts at Fortra on Thu, 06/11/2015
Home improvement giant Home Depot is asking a court to dismiss a class action lawsuit against it stemming from a massive theft of credit card numbers from its corporate network last year. The argument: no harm was done as a result of the breach.
Blog
5 Questions to Prepare for Your Next Security Audit
By Cybersecurity Experts at Fortra on Thu, 06/04/2015
Use these five questions to gauge your audit readiness and prepare to demonstrate your security posture to corporate clients.
Blog
BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
By Cybersecurity Experts at Fortra on Wed, 06/03/2015
30 data security experts discuss the best policies on BYOD and how to prevent a breach.
Blog
How to “Time-bomb” a Confidential File with Fortra Secure Collaboration
By Cybersecurity Experts at Fortra on Tue, 06/02/2015
Self-destructing messages are certainly attention grabbing, but there are many legitimate reasons to limit someone's ability to view or edit a file, by time, by usage, or even by role. We have customers today using this capability to manage job offers and term sheets that expire after a specific date. Some are even managing the lifecycle of business records and classified data types that must be destroyed after a certain number of days, weeks, or months.