Being a cybersecurity professional means you’re regularly in charge of making complex decisions with real-world consequences, like choosing the right cybersecurity benchmarks, controls, frameworks, or best practices for your organization. Should you apply the CIS Controls, the NIST Cybersecurity Framework, or something else? Without overarching industry consensus, it can be...
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that...
Organizations today are challenged to find a balance between encouraging employees to use social media for business while staying mindful of the potential security threats.
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.
This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to...
This webinar provides an overview of Intermapper Flows, the integrated network bandwidth monitoring tool within Intermapper that provides you with real-time information on the full activity of your network.