Blog
Continuous PCI DSS Compliance with File Integrity Monitoring
By Guest Authors on Tue, 10/28/2025
PCI DSS compliance is often seen as a one-off task, that is, you do the audit, implement controls, and then move on.But then there comes the problem - systems aren’t static, meaning that files, scripts, and configurations change constantly, and even small untracked changes can create gaps that lead to non-compliance or security issues.This is where File Integrity Monitoring (FIM) comes in. It...
Blog
Are We Failing to Secure Files? Attackers Aren’t Failing to Check
By Chris Hudson on Wed, 10/22/2025
According to a new Ponemon study, weak file protections now account for several cybersecurity incidents a year for many organizations.Unsafe file-sharing practices, malicious vendor files, weak access controls, and obscured file activity are largely to blame. File Integrity Monitoring (FIM) could be the solution.Are Files Safe in Transit? More Than Half UnsureYou know something’s wrong when more...
Blog
Beyond VDI: Security Patterns for BYOD and Contractors in 2025
By Guest Authors on Tue, 10/14/2025
Remote work is no longer a contingency – it’s the operating norm. Yet the security posture for that work often leans on virtual desktops as a default, even when the workforce is dominated by bring‑your‑own‑device (BYOD) users and short‑term contractors.Virtual desktop infrastructure (VDI) can centralize risk, but it can also centralize failure, expand the admin plane, and add latency that users...
Blog
Understanding Vulnerability Management and Patch Management
By Katrina Thompson on Mon, 10/06/2025
Vulnerability management and patch management are often spoken of in the same breath. Yet they are not the same. Each serves a distinct purpose, and knowing the difference is more than a matter of semantics; it’s a matter of security. Confuse them, and gaps appear. Leave those gaps, and attackers will find them. To build a strong defense, you need to see how these two processes fit together. One...
Blog
Understanding the OWASP AI Maturity Assessment
By Josh Breaker-Rolfe on Mon, 09/29/2025
Today, almost all organizations use AI in some way. But while it creates invaluable opportunities for innovation and efficiency, it also carries serious risks. Mitigating these risks and ensuring responsible AI adoption relies on mature AI models, guided by governance frameworks. The OWASP AI Maturity Assessment Model (AIMA) is one of the most practical. In this article, we’ll explore what it is,...
Live Event
Oct
07
7:00am - 2:00pm PDT
Blog
CISOs Concerned of AI Adoption in Business Environments
By Kirsten Doyle on Fri, 09/19/2025
UK security leaders are making their voices heard. Four in five want DeepSeek under regulation. They see a tool that promises efficiency but risks chaos. Business is already under pressure. Trade disputes drag on. Interest rates remain high. Cyber threats grow. Every move to expand operations adds risk, and risk is harder to measure when AI enters the equation. AI spreads fast. It cuts costs,...
Blog
When It Comes to Breaches, Boards Can’t Hide Behind CISOs Any Longer
By Katrina Thompson on Wed, 09/17/2025
A trend that has long been on the rise is finally having its day. A recent industry report revealed that 91% of security professionals believe that ultimate accountability for cybersecurity incidents lies with the board itself, not with CISOs or security managers.If the security discussion hadn’t fully made its way into C-suite conversations before, it has now. The Chartered Institute of...
Blog
Windows 10 Retirement: A Reminder for Managing Legacy Industrial Control Systems (ICS)
By Katrina Thompson on Tue, 09/16/2025
On October 14th, Windows 10 will be retired, and Microsoft will no longer push patches or updates to systems on that operating system. It is crucial for companies to make the jump to Windows 11 now—or risk being exposed to critical vulnerabilities. This is especially important for Industrial Control Systems (ICS), which often run on legacy systems. Failing to transition could mean putting...
Blog
ENISA Will Operate the EU Cybersecurity Reserve. What This Means for Managed Security Service Providers
By Kirsten Doyle on Mon, 09/15/2025
The European Union is building a new line of defense. On 26 August 2025, the European Commission and the EU Agency for Cybersecurity (ENISA) signed a contribution agreement that hands ENISA the keys to the EU Cybersecurity Reserve. The deal comes with funding: €36 million over three years. ENISA's mission is straightforward, if not simple. It will administer, operate, and monitor the bloc’s...
Blog
Why File Integrity Monitoring (FIM) Is a Must for Compliance — And How to Pick the Right Solution
By Katrina Thompson on Thu, 09/11/2025
As Fortra’s new File Integrity Monitoring Buyer’s Guide states, “What was once a security control for simple file changes now ensures integrity across organizations’ entire systems.” The landscape has evolved significantly since Fortra’s Tripwire introduced file integrity monitoring (FIM) over twenty years ago.But that’s exactly why the industry is due for a new look at what makes a FIM solution...
Blog
Times are Changing. How to Future-Proof Your Cybersecurity Career.
By Anthony Israel-Davis on Wed, 09/10/2025
Since the floodgates opened in November 2022 (at the arrival of ChatGPT), there has been one question on everyone’s mind: Is AI going to take my job?While the answers range from yes to no to maybe, there are ways to ride the AI wave without being subsumed by it. The way skilled professionals will do that, especially within cybersecurity, all depends on how well they know the industry—and how well...
Blog
Automotive Privacy in California: The UX Benchmark That Could Change Everything
By Kirsten Doyle on Mon, 09/08/2025
Every modern car is a data machine. It records where you go, when you go, how you drive, and often, who is with you. This information flows quietly from vehicle to manufacturer. In California, the law is clear. The California Consumer Privacy Act (CCPA) has been in effect since 2020, giving people the right to see, limit, and delete personal data. But a right is only as strong as the tools that...
Blog
The CSA AI Controls Matrix: A Framework for Trustworthy AI
By Kirsten Doyle on Wed, 09/03/2025
The Cloud Security Alliance, a respected non-profit founded in 2008 to pursue cloud security assurance, has now unveiled its Artificial Intelligence Controls Matrix (AICM), a quiet revolution for trustworthy AI. It has come at a time when generative AI and large language models are moving quickly into every sector. These systems can transform business, but they can also fail, or be made to fail....
Blog
From Food to Friendship: How Scammers Prey on Our Most Basic Needs
By Josh Breaker-Rolfe on Mon, 09/01/2025
Scammers are opportunists. Nasty ones. They prey on the most fundamental human needs: Survival: Food, shelter, and securityConnection: Friendship, belonging, and community.On the surface, a food-assistance scam and a fake-friend scam may seem worlds apart. One promises food, the other companionship. But underneath, they follow the same psychological playbook: build trust, create urgency, extract...
Blog
Mitigating Security Risks in Low-Code Development Environments
By Guest Authors on Wed, 08/27/2025
I still remember the soft whir of the server room fans and that faint smell of ozone when we, a team of cybersecurity analysts, traced a spike in traffic to a “harmless” low-code workflow. A store manager had built a nifty dashboard to pull sales numbers. It looked tidy, almost playful – boxes, arrows, green check marks. Under the hood, it was hitting an internal API without proper authentication....
Blog
MITRE Introduces AADAPT Framework to Combat Crypto-Focused Cyber Threats
By Katrina Thompson on Tue, 08/26/2025
Amid a surge in cryptocurrency-related cybercrime, MITRE has unveiled AADAPT (Adversarial Actions in Digital Asset Payment Technologies), a brand-new framework designed to shore up cybersecurity weaknesses within digital financial systems such as cryptocurrency.How Does AADAPT Work?Following the construction of MITRE ATT&CK, AADAPT offers a methodology for identifying, analyzing, and mitigating...
Blog
NATO's Cybersecurity Spending Proposals’ Impact on the Industry
By Guest Authors on Wed, 08/20/2025
NATO has fundamentally redefined what it means to defend the alliance. At the 2025 NATO Summit in The Hague, allies made a commitment to investing 5% of Gross Domestic Product (GDP) annually on core defense requirements and defense and security-related spending by 2035. This represents a dramatic escalation from the previous 2% GDP benchmark. The commitment also includes a condition about how they...