Resources

News Article

The Futurum Group: Black Hat 2024 Reflections: Security Challenges Demand Rethink on Tools and Processes

The Futurum Group’s analysis of Black Hat 2024 highlights how the growing complexity of cybersecurity tools is driving the need for streamlined platforms. Fortra is mentioned alongside other leading vendors for offering solutions that reduce tool sprawl, cut costs, and close security gaps.Originally published by The Futurum Group.Excerpt: "The cybersecurity market has long been driven by user...
Product Video

Security Awareness Training Videos

Watch a sampling of Terranova Security's cyber security training video lessons. Experience the industry’s highest-quality security awareness training content.
Guide

The Cyber Security Hub

Access free security awareness training content on a variety of important topics, including phishing, social engineering, ransomware, passwords, and much more.
Blog

Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
News Article

How to Fortify Defenses Before Threats Materialize

Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
Blog

Patch Tuesday Update August 2024

The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
Guide

Guide to Creating a Proactive Cybersecurity Strategy

Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
Live Event
File integrity monitoring was invented by Tripwire’s founder over 25 years ago and has evolved over time to become one of the most important security controls — so critical, in fact, that it’s required by major compliance standards like the Payment Card Industry Data Security Standard (PCI DSS). But what a lot of cybersecurity professionals aren’t familiar with is how FIM has...