What Is File Security? Best Practices & Tools for Security
File security is integral to effective cybersecurity. In today's blog, we dig into the difference between file security and data security, best practices, and tools to implement for file security.
USB Security: How to Prevent Data Loss and Stop Malware
Graeme Batsman, a Senior Security Consultant with Fortra’s Professional Services team, gives a primer on all things USB: How to limit data ingress, egress, and other technical controls that can be implemented to mitigate risk.
What Is Code Encryption and How Does It Work?
What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.
What To Look for in a HIPAA-Compliant Email Provider
Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.
Data Protection – Are We Focused on the Correct Areas?
How do you defend against data loss you can't see? The breaches you don't hear about? Our Wade Barisoff connects the dots between WWII airplanes and data protection to find the answer.
NSA Provides Direction on Eliminating Obsolete Encryption Protocols
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
Zoom Hit With Lawsuit Over Encryption Claims
A consumer advocacy group filed a lawsuit against the web conferencing software company alleging it misrepresented the level of security it uses to protect communications.
NIST Sets New Standard for Data Encryption Testing
NIST has updated the Federal Information Processing Standard, or FIPS, to align with the international standard, ISO 19790, for the first time.
45 Percent of Orgs Have Encryption Plan in Place
A Ponemon Institute report published today says the biggest driver to encryption for organizations is protecting enterprise intellectual property and consumer personal information.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!