Blog RSS Feed Fortra Blog
- Silent Heists: The Danger of Insider Threatsby Kirsten Doyle on December 19, 2024 at 10:32 am
When thinking about cybersecurity, we envision malicious actors working in dark basements, honing their tools to invent cunning new ways to breach our defenses. While this is a clear and present danger, it’s also important to understand that another hazard is lurking much closer to home – the insider threat. These attacks have devastated entities in all sectors, with severe repercussions. These incidents can vary from straightforward acts of fraud or theft to more elaborate sabotage attempts. This is concerning because the recent IBM 2024 Cost of Data Breach survey found that the cost of a…
- Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzerby Paul Stewart on December 18, 2024 at 9:21 am
One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as one patch cycle is completed, another set of patches are released. When compounded with the highly regulated energy industry, governed by the NERC CIP Standards, the task becomes even more daunting. Fortunately, Fortra’s Tripwire Enterprise (TE) and Tripwire State Analyzer (TSA) can ease the process. Some of the specified requirements align directly with the capabilities of TE, For example, the rationale section of CIP-010-4 R1 states that “the configuration change management processes are…
- CIS Control 08: Audit Log Managementby Matthew Jerzewski on December 18, 2024 at 9:21 am
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular reviews are useful for identifying baselines, establishing operational trends, and detecting abnormalities. In some cases, logging may be the only evidence of a successful attack. CIS Control 8 emphasizes the need for centralized collection and storage and standardization to better coordinate audit log reviews. Some industries have regulatory bodies that require the collection, retention, and review of…
- How the Cyber Essentials Certification Can Help Your Businessby Mark Conway on December 17, 2024 at 9:59 am
Cybersecurity is a vital concern for organisations, but many security strategies fall short: recent research shows that 44% of UK companies are lacking in basic cybersecurity skills. The consequences of poor security go far beyond the direct impacts of cyberattacks, and the benefits of effective security are numerous as well. Unfortunately, it can be extremely complicated and difficult to cover all angles and vectors of attack, protect large and spread-out attack surfaces, and maintain compliance with relevant regulations. Cyber Essentials, first released in 2014 by the United Kingdom’s…
- London’s CNI is Under Threatby Darren Gale on December 17, 2024 at 9:59 am
London is one of the smartest and most interconnected cities in the world. Digital infrastructure plays a role in almost every facet of society, streamlining public transport, improving healthcare provision, boosting sustainability, and more. However, this reliance on technology has left London’s critical national infrastructure ( CNI) perilously vulnerable to digital attacks. As geopolitical relationships deteriorate and nation-state threats to critical infrastructure increase, the UK can no longer ignore this problem. The Impact of Critical National Infrastructure Failures As a sprawling…
- What’s the Difference Between DSPM, CSPM, and CIEM?by Katrina Thompson on December 16, 2024 at 9:35 am
DSPM, CSPM, and CIEM are more than just a mouthful of acronyms. They are some of today’s most sophisticated tools for managing data security in the cloud. While they are all distinct entities and go about protecting data in different ways, the fact that they all seem to do very much the same thing can lead to a lot of confusion. This, in turn, can sell each of these unique solutions short – after all, they were all created in response to a specific problem. And the cloud is full of complex issues, warranting layered solutions in response. Just like antivirus tools, firewalls, and email…
- Digital Threats, Real Losses: Cyber Risks to Retail Operationsby Theo Zafirakos on December 16, 2024 at 9:35 am
The success of retailers depends on being able to offer consumers what they want. That means, for example, stocking Halloween costumes in October, turkeys in November, and Christmas decorations in December. Cybercriminals are all too aware of this fact and more than willing to capitalize on it, typically for financial gain or to cause disruption. The holiday season is the busiest time of year for retailers and contributes a significant portion of their revenue—research published in Forbes even revealed that, for SMEs, the holiday season accounts for at least 25% of yearly revenue. As such…
- The Top 10 State of Security Blog Posts From 2024by Joe Pettit on December 16, 2024 at 9:35 am
As we approach the end of another exciting year in the world of cybersecurity, it’s the perfect time to reflect on the stories, insights, and guidance that resonated most with our readers. 2024 brought new challenges and opportunities with the rapid adoption of AI, evolving ransomware tactics, and an increased focus on proactive security measures. These trends shaped the conversations on Fortra’s State of Security blog as we explored emerging threats and practical solutions. The ten blogs featured here were chosen for their relevance, depth, and the actionable insights they offered. Whether…
- 27 DDoS-For-Hire Services Disrupted In Run-Up To Holiday Seasonby Graham Cluley on December 12, 2024 at 12:14 pm
In a co-ordinated international effort, the law enforcement agencies of 15 countries have made the holiday season a little less stressful for companies and consumers – by seizing control of some of the internet’s most popular DDoS-for-hire services. Operation PowerOFF has disrupted what was anticipated to be a surge of distributed denial-of-service (DDoS) attacks over the Christmas period by taking over two dozen “booter” or “stresser” websites offline. As Europol explains, every year the festive season is a peak period for cybercriminals to launch DDoS attacks, causing organisations financial…
- CIS Control 09: Email and Web Browser Protectionsby Matthew Jerzewski on December 11, 2024 at 11:29 am
Web browsers and email clients are used to interact with external and internal assets. Both applications can be used as a point of entry within an organization. Users of these applications can be manipulated using social engineering attacks. A successful social engineering attack needs to convince users to interact with malicious content. A successful attack could give an attacker an entry point within an organization. CIS Control 9 provides several safeguards to ensure the safety of external information. Key Takeaways for Control 9 Web Browsers Web browsers can be protected by the following…