Resources

Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
News Article

Forbes: New Windows 10 And 11 Blue Screen Of Death Warning Issued

Fortra recently uncovered a vulnerability in Windows that can cause a blue screen of death. Today, Fortra issued an advisory for Windows vulnerability CVE-2024-6768. Originally published in Forbes.Excerpt: “The potential problems include system instability and denial of service,” Ricardo Narvaja, principal exploit writer with security company Fortra, and the author of the report, said, “malicious...
News Article

IT Security Wire: Role of Cybersecurity Tools in Email Protection

Cary Hudgins and Mike Jones recently joined the IT Security Wire podcast to dive into the vital role of email protection in business resilience. Since emails are often the first target for cyberattacks, they discussed cutting-edge solutions and emphasized the need for integrating robust email security with your operating platforms.
On-Demand Webinar

[WEBINAR] Nowhere Left to Hide: Exposing Financial Services Fraudsters Who Hide in Plain Sight

Session DetailsSecurity leaders of financial institutions have some of the most demanding job descriptions in the industry. Threat actors go where the money goes, and let’s just say that a certain industry has a giant sign hanging above it.As teams try to crack down on enterprise security, cybercriminals continue to attack on multiple fronts. With the complexity of the financial sector increasing...
News Article

Manufacturing Business Technology: Security Breach Podcast

Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.