Blog
Solving Big Cybersecurity Challenges Needs Big Thinking. Fortra's John Grancarich is Ready.
Fri, 03/11/2022
Tech visionary John Grancarich discusses today’s cybersecurity challenges and Fortra’ innovative plans for helping customers succeed.
Blog
Cyber Insurance: How It Works and Why Every Organization Needs It
Fri, 01/07/2022
When a cybersecurity strategy isn't quite enough, cyber insurance may be the next best step to fight against cybercrime. Here's why every organization needs it.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Blog
The Evolution and Advancement of Penetration Testing Under Covid-19
Fri, 05/21/2021
Brian Wenngatz, general manager at Core Security, a Fortra company, discusses the advancement of penetration testing during Covid-19.
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
By Bob Erdman on Mon, 10/19/2020
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows...
Blog
How Does the DMZ Impact Security?
By Heath Kath on Wed, 10/14/2020
The DMZ can be a good tool to add to your arsenal, but are you aware how it can impact your security negatively?
Blog
35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)
Tue, 09/08/2020
Need a new cybersecurity joke to start off your next team happy hour or a fresh funny graphic for an upcoming presentation? Check out the latest cybersecurity jokes, puns, and one-liners of 2020.
Blog
Six Strategies to Ensure You Give the Right Access to the Right People at the Right Time
Mon, 08/31/2020
Part 2 of the Improving Your Security-Efficiency Balance Series:
One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
How Encryption Works: Everything You Need to Know
By Brian Pick on Mon, 07/27/2020
Encrypting files helps defend against cybersecurity threats. Learn more about how it works and what method, combined with GoAnywhere MFT, is recommended depending on your specific needs.
Blog
Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?
Thu, 07/16/2020
Open source and enterprise-level SIEM solutions all have pros and cons. Here are some factors to look at when comparing your options—including one you might not have considered yet.
Blog
Four Network Security Challenges for Organizations with a Remote Workforce
By Bob Erdman on Wed, 03/25/2020
Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.