Cyber threats are more sophisticated, pervasive, and frequent than ever before. As a result, traditional methods for network security are becoming obsolete. These solutions simply cannot handle the extraordinary scale and complexity of network traffic inherent in modern IT environments.…
Tag: Blog RSS Feed
Advice for Exponential Organizations: Intersecting Agile and Incident Response
While Exponential Organizations (ExOs) are transforming industries beyond the tech space, that doesn’t mean that they are not susceptible to an increasing number of cyber threats. As ExOs harness innovative and cutting-edge technologies to drive transformative growth, the ability to…
What’s Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In
We are fast approaching the end of (another) turbulent year for cybersecurity. Looking back, it’s hard to believe that so much can happen in such a short time. As we finish up our work for the year, head home to…
The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley
A Divisive Veto: California Rejects AI Safety Bill SB 1047 California Governor Gavin Newsom’s recent veto of SB 1047, a proposed AI safety bill, has sparked a hot debate on the balance between innovation and regulation in the artificial intelligence…
Understanding Data Leaks: Causes, Consequences, and Prevention Strategies
Imagine a seemingly minor misconfiguration in your cloud storage or an employee accidentally emailing a sensitive file to the wrong person. These incidents might seem trivial, but they can quickly snowball into a massive data breach, causing financial consequences. This…
The State of Security in 2024: The Fortra Experts Take a Look
At Fortra, we like to encourage a collaborative environment. One of the ways we bring our community together is through our Transformer meetups which aim to provide a positive, energizing, and fun hub for all Fortra employees to learn how…
4 Security Controls Keeping Up with the Evolution of IT Environments
The rapid adoption of cloud technology in the past few years has transformed IT environments, enabling unprecedented opportunities for flexibility, scalability, and collaboration. However, this transformation has introduced a potentially dangerous level of complexity into these environments – recent research…
Silent Heists: The Danger of Insider Threats
When thinking about cybersecurity, we envision malicious actors working in dark basements, honing their tools to invent cunning new ways to breach our defenses. While this is a clear and present danger, it’s also important to understand that another hazard…
CIS Control 08: Audit Log Management
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular reviews are useful for identifying baselines, establishing operational trends, and…
Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer
One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as one patch cycle is completed, another set of patches are released. When compounded with the highly regulated energy industry, governed by the NERC CIP Standards,…