Watch a sampling of Terranova Security's cyber security training video lessons. Experience the industry’s highest-quality security awareness training content.
Access free security awareness training content on a variety of important topics, including phishing, social engineering, ransomware, passwords, and much more.
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
A phishing campaign targets businesses to compromise Facebook and Instagram accounts with access to Meta Business Suite. In this Cyber Defense Magazine article, Michael Tyler discusses the tactics behind the campaign and shares tips to stay safe.
Microsoft issued 139 unique CVEs in its July Patch Tuesday update. Tyler Reguly spoke with Dark Reading and discussed the CVEs that affect Microsoft SQL Server.
Fortra's leading data protection offering delivers interlocking security for all cybersecurity maturity levels. Our modular solutions for data classification, data loss prevention, and secure collaboration combine to address your immediate needs and use cases, as well as advise your next best steps as your security program evolves.IndoSec is an annual cybersecurity summit that...
File integrity monitoring was invented by Tripwire’s founder over 25 years ago and has evolved over time to become one of the most important security controls — so critical, in fact, that it’s required by major compliance standards like the Payment Card Industry Data Security Standard (PCI DSS). But what a lot of cybersecurity professionals aren’t familiar with is how FIM has...
How can companies utilize AI in cybersecurity? John Grancarich, Chief Strategy Officer at Fortra, spoke with AIthority about the role of AI in security operations.
In this Cyber Defense Magazine article, Michael Tyler, Sr. Director of Security Operations at Fortra, discusses a sophisticated phishing campaign targeting Meta business accounts. He explains the tactics behind the campaign and shares tips to protect against it.
In her interview with The ChannelPro Network, Michaela Grundman, Associate VP of Product Management at Fortra, introduced the Fortra Platform and discussed how it helps mitigate multi-vector attacks.