File security is integral to effective cybersecurity. In today's blog, we dig into the difference between file security and data security, best practices, and tools to implement for file security.
Graeme Batsman, a Senior Security Consultant with Fortra’s Professional Services team, gives a primer on all things USB: How to limit data ingress, egress, and other technical controls that can be implemented to mitigate risk.
What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.
Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.
How do you defend against data loss you can't see? The breaches you don't hear about? Our Wade Barisoff connects the dots between WWII airplanes and data protection to find the answer.
A hack of a water treatment plant, SIM swapping used on celebrities, and a popular barcode app turned into malware - catch up on all of the week's infosec news with the Friday Five!
Deepfakes, ransomware tactics, and Signal clones - catch up on all of the week's infosec news with the Friday Five!
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
Cyber Command trolling, end-to-end encryption debates, and stolen source code - catch up on all the week's infosec news with the Friday Five!
Sign Up For Updates
Thank you for subscribing!