-
The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley
A Divisive Veto: California Rejects AI Safety Bill SB 1047 California Governor Gavin Newsom’s recent veto of SB 1047, a proposed AI safety bill, has sparked a hot debate on the balance between innovation and regulation in the artificial intelligence (AI) space. California has over a dozen AI related bills that have been signed although…
-
What’s Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In
We are fast approaching the end of (another) turbulent year for cybersecurity. Looking back, it’s hard to believe that so much can happen in such a short time. As we finish up our work for the year, head home to our families, and prepare to close the book on 2024, it’s worth considering what’s next.…
-
Understanding Data Leaks: Causes, Consequences, and Prevention Strategies
Imagine a seemingly minor misconfiguration in your cloud storage or an employee accidentally emailing a sensitive file to the wrong person. These incidents might seem trivial, but they can quickly snowball into a massive data breach, causing financial consequences. This scenario is a stark reminder of the importance of understanding and preventing data leaks. Data…
-
4 Security Controls Keeping Up with the Evolution of IT Environments
The rapid adoption of cloud technology in the past few years has transformed IT environments, enabling unprecedented opportunities for flexibility, scalability, and collaboration. However, this transformation has introduced a potentially dangerous level of complexity into these environments – recent research from PwC revealed that 75% of executives report too much complexity in their organizations, leading…
-
The State of Security in 2024: The Fortra Experts Take a Look
At Fortra, we like to encourage a collaborative environment. One of the ways we bring our community together is through our Transformer meetups which aim to provide a positive, energizing, and fun hub for all Fortra employees to learn how to be innovative, get inspired by others, and reach their creative potential. Our most recent…
-
Silent Heists: The Danger of Insider Threats
When thinking about cybersecurity, we envision malicious actors working in dark basements, honing their tools to invent cunning new ways to breach our defenses. While this is a clear and present danger, it’s also important to understand that another hazard is lurking much closer to home – the insider threat. These attacks have devastated entities…
-
Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer
One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as one patch cycle is completed, another set of patches are released. When compounded with the highly regulated energy industry, governed by the NERC CIP Standards, the task becomes even more daunting. Fortunately, Fortra’s Tripwire Enterprise (TE) and Tripwire State Analyzer…
-
Pico Pal Puts RP2350 Into Game Boy Color Shell
While modern gaming systems deliver ever more realistic experiences, there’s still something to be said for the consoles and handhelds of the 80s and 90s. For many, the appeal is nostalgic. Others are attracted to the “lo-fi” graphical and sound design of these games, necessitated by the limited hardware of the time. That said nobody…
-
Friday Five — January 3, 2025
AI use cases: Not sure how AI can help your organization? Start here.AI is arguably the most significant technological advancement since the internet, but there can be a disconnect between how people and organizations think about AI and ML and their approach. Here are some ideas about what you should do before you launch your…
-
Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today
This post was originally published on Forbes. Today, our most sensitive information is generally encrypted — from your personal messages, banking and health information to things like classified military documents and companies’ trade secrets. But there’s a growing threat looming over our collective privacy and security — and that’s quantum computing. Currently being developed by…