Blog
Silent Heists: The Danger of Insider Threats
By Kirsten Doyle on Thu, 12/19/2024
When thinking about cybersecurity, we envision malicious actors working in dark basements, honing their tools to invent cunning new ways to breach our defenses. While this is a clear and present danger, it's also important to understand that another hazard is lurking much closer to home - the insider threat.These attacks have devastated entities in all sectors, with severe repercussions. These...
Blog
Developing an Effective Change Management Program
By John Salmi on Tue, 11/08/2022
Change detection is easy. What is not so easy, is reconciling change. Change reconciliation is where most organizations stumble. What was the change? When was it made? Who made it? Was it authorized? The ability to answer these questions are the elements that comprise change management.Historically, the haste of accomplishing a task consisted of a...
Blog
Increasing Your Business’ Cyber Maturity with Fortra
By Antonio Sanchez on Wed, 09/20/2023
When building a tower, it helps to start with a sturdy foundation. Cyber maturity is the tower, and there are three levels that build it:
Foundational IT/OT & Security Control Processes
Fundamental Security Control Capabilities
Advanced Security Control Capabilities
Fortra occupies a unique space in the industry because of the sheer size of...
Quote
Get a Custom Quote for Tripwire ExpertOps
Instant Expertise With Managed Cybersecurity
Does your security team have too much to do and too little time? Managed services are the perfect route to get all the benefits of a leading cybersecurity solution without having to operate it yourself.
Fortra’s Tripwire® ExpertOps℠ is a managed cybersecurity service that equips you with the advice and support needed to protect your data from...
Blog
Getting Email Security Right
By Zachary Travis on Mon, 05/05/2025
Let’s face it: your inbox is a warzone. Email security is a constant battle between evolving threats and the defenses designed to stop them. Every day, attackers bombard user inboxes with increasingly sophisticated phishing attempts, malware, and social engineering attacks. So, how do we win the battle? It’s not as simple as slapping on a piece of software; it’s about implementing a multi-layered...
Blog
5 Critical Security Risks Facing COBOL Mainframes
By Gilad David Maayan on Tue, 07/01/2025
COBOL remains deeply embedded in the infrastructure of global enterprises, powering critical systems in banking, insurance, government, and beyond. While its stability and processing efficiency are unmatched, legacy environments running COBOL face a growing challenge: Security.As cyber threats evolve and legacy systems continue to age, COBOL-based mainframes present attractive targets due to their...
Blog
From Data Overload to Action: Why Modern Vulnerability Management Must Be Workflow-Driven
By Katrina Thompson on Mon, 08/11/2025
We all know where vulnerability management fits into an overall security strategy; it provides the raw data that analysts use to figure out what’s wrong and what needs to be fixed. The problem is, traditional VM stops there – leaving analysts to do all the work.Today’s companies don’t have the luxury of doing that anymore. Experts are needed on the front lines, not vetting false positives, and VM...
Datasheet
10 Ways Tripwire Outperforms Other Cybersecurity Solutions
As a security professional, you’re tasked with protecting your organization against attacks, detecting threats, identifying vulnerabilities and hardening configurations. But in an increasingly crowded marketplace, how do you choose the right cybersecurity partner? From experience and technical innovation to security expertise, Fortra's Tripwire stands out from the competition.Here are 10 reasons...
Blog
Enhanced Data Analysis with Synthetic Datasets
By Isla Sibanda on Wed, 07/26/2023
Large data can offer a massive affordable advantage for companies. Scientists, information analysts, marketing professionals, and advertisers rely upon receiving valuable insights from substantial pools of consumer information. When examined correctly, this information can provide valuable insight for organizations that understand how to use it.
...
Blog
Understanding Firewalls – Types, Configuration, and Best Practices for Effective Network Security
By Dilki Rathnayake on Wed, 08/30/2023
A firewall is a security device that controls the flow of traffic across a network. A firewall may be a hardware appliance, or it may be a piece of software that runs on a third-party operating system. Firewalls operate based on a set of pre-defined, as well as customizable security rules that inspect network traffic to block or permit access to a...
Blog
Working with a Reliable Partner for Cybersecurity Success
By Joe Pettit on Thu, 08/31/2023
Technology companies are often seen as revolving doors of constantly shifting personnel. Whether they are seeking a better work environment or chasing a higher paycheck, these staff changes can hurt an organization’s progress. Worse yet, the customers are often negatively impacted by these changes in the continuity of established relationships.
At...
Blog
Essential Security Best Practices for Remote Work
By Fortra Staff on Wed, 11/20/2024
As we continue to embrace remote work, it’s crucial to keep our security practices sharp to protect both company and personal data. With increasing cyber threats, adhering to security best practices helps us safeguard our information and maintain our productivity. Here’s a quick guide to help you stay vigilant and secure while working remotely.Secure Your Home OfficePick a space that is private.Do...
Blog
Managing Security and Compliance in a Remote Work Environment
By Joseph Chukwube on Mon, 01/20/2025
Remote work isn’t just a temporary trend anymore; it has become a permanent fixture. What began as a quick response during the pandemic has evolved into the new normal for businesses worldwide. In America, 20% of people now work from home.While this has its advantages (flexibility for workers and cost savings for businesses), it’s not without its complications, having cracked open a host of issues...
Blog
The Latest Email Scams: Key Trends to Look Out For
By Guest Authors on Mon, 09/23/2024
Amid the numerous instruments that have augmented our digital communication and commerce experiences over time, email remains a staple for everything, from confirming purchases to life-changing events like the authorization of financial aid.It comes as no surprise that email scams have been a mainstay of cyberattacks since the earliest days of online correspondence. Worse yet, their scope and...
Blog
Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks
By Graham Cluley on Tue, 02/18/2025
Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East.The Russian group, known as Storm-2372, has targeted government and non-governmental organisations (NGOs), as well as firms working in IT, defence, telecoms, health, and the...
Blog
The Cyber War on Democracy: Lessons from the 2024 RNC Email Hack
By Kirsten Doyle on Tue, 04/22/2025
In July 2024, as the Republican National Committee (RNC) geared up for its national convention in Milwaukee, Chinese hackers infiltrated the RNC's email system. According to The Wall Street Journal, attackers maintained access for several months, trying to get their hands on intelligence on how the GOP planned to address Taiwan in its party platform. Microsoft alerted top party officials about...
Blog
Smart Africa Unveils 5-Year Cybersecurity Plan to Strengthen Digital Resilience
By Josh Breaker-Rolfe on Wed, 04/23/2025
Africa has made huge strides in digital transformation in the past few years. For example, over 160 million Africans gained broadband internet access between 2019 and 2022. As the continent embraces digitalization, cybersecurity is becoming an increasingly pressing concern. Recognizing the need for a coordinated approach to cybersecurity, Smart Africa recently launched the African Network of...
Blog
How IoT Security Cameras Are Susceptible to Cyber Attacks
By Chester Avey on Tue, 05/20/2025
The proliferation of Internet of Things (IoT) devices - more specifically, security cameras - has forced organizations to rethink how they protect their physical hardware.Security cameras represent some of the most common IoT devices installed in business and commercial environments. Recent estimates suggest the smart camera market is expected to grow at an astronomical rate, reaching a potential...
Blog
Dead Man’s Scripts: The Security Risk of Forgotten Scheduled Tasks in Legacy Systems
By Guest Authors on Mon, 05/19/2025
There are ghosts in the machine.Not the poetic kind. I mean literal, running-code-with-root-access kind. The kind that was set up ten years ago by an admin who retired five jobs ago. The kind that still wakes up every night at 3:30 a.m.; processes something no one remembers, and then quietly vanishes into the system logs. Until, of course, something goes wrong—or someone takes advantage of it...