News Article
IT Brew: More Than Half of IT Professionals Aren’t Familiar With the Shared Responsibility Model
By Nick Franklin on Fri, 09/20/2024
A recent IT Brew article highlights a major cloud security gap: only 49% of surveyed IT and cybersecurity professionals are familiar with the "shared responsibility model," which defines the division of security duties between cloud providers and customers. Nick Franklin emphasized the common misunderstanding around these responsibilities, urging customers to ask their providers directly about what they are responsible for.
News Article
Reworked: How Security Service Edge Applications Enable Hybrid and Remote Work
By Wade Barisoff on Fri, 09/20/2024
Security Service Edge (SSE) applications are becoming essential for securing hybrid and remote work environments. In a recent article in Reworked, Wade Barisoff highlights which organizations are best suited for SSEs and how these solutions can enhance security effectively.
News Article
DZone: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
By Antonio Sanchez on Fri, 09/13/2024
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
News Article
The SupplyChainBrain Podcast: The Latest Plague: A Huge Increase in Supply Chain Cyberattacks
By Theo Zafirakos on Wed, 08/07/2024
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
News Article
Manufacturing Business Technology: Security Breach Podcast
By Theo Zafirakos on Wed, 07/31/2024
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
Live Event
Sep
24
All day
Quote
Get Custom Penetration Testing Services Pricing
Find Your VulnerabilitiesCore Security's Security Consulting Services (SCS) simulates trending and new cyber threats to uncover security weaknesses, comply with regulatory compliance standards, and strengthen your security landscape. See how affordable pen testing can be, complete the form and get a customized quote from our experts based on your security needs.Get More With Security Consulting...
News Article
AIthority: Role of AI in Cybersecurity
By John Grancarich on Fri, 06/28/2024
How can companies utilize AI in cybersecurity? John Grancarich, Chief Strategy Officer at Fortra, spoke with AIthority about the role of AI in security operations.
News Article
The ChannelPro Network: Voice of the Vendor
Fri, 06/28/2024
In her interview with The ChannelPro Network, Michaela Grundman, Associate VP of Product Management at Fortra, introduced the Fortra Platform and discussed how it helps mitigate multi-vector attacks.
Demo
Watch a Demo of Fortra Vulnerability Management
Fortra Vulnerability Management (formerly Frontline VM) is more than a scan. This risk-based, scalable VM solution streamlines vulnerability identification and prioritization, producing accurate, actionable reports that empower quick remediation. Whether your team is just beginning network security assessments or establishing on-going, automated assessments and reporting, our feature-rich VM is...