Blog

Blog

Prescription For Disaster: Sensitive Patient Data Leaked in Ascension Breach

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. To the undoubted distress of Ascension's client base, the details of hundreds of thousands have fallen into the hands of hackers, opening up opportunities for fraud and identity theft. Breached...
Blog

What is CASB?

CASB definedA cloud access security broker (CASB), is cloud-delivered software or on-premises software and/or hardware that acts as an intermediary between users and cloud service providers. The ability of CASBs to address gaps in security extends across software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) environments. In addition to providing...
Blog

What is ZTNA?

Zero Trust NetworkingAs an increasing number of users access resources from anywhere, ZTNA solutions can help eliminate gaps in other secure remote access technologies and methods.Zero Trust Network Access (ZTNA) enforces granular, adaptive, and context-aware policies for providing secure and seamless Zero Trust access to private apps hosted across clouds and corporate data centers, from any...
Blog

What is User and Entity Behavior Analytics (UEBA)?

UEBA is a cybersecurity process that monitors normal usage behavior and flags deviations from established patterns. Because while a perpetrator can easily steal an employee’s username and password, it's much harder to imitate that person’s normal behavior on the network connecting to applications and data. UEBA helps detect intentional and unintentional insider threats, where an authorized user...
Blog

What is SaaS Security Posture Management (SSPM)?

A strong security posture keeps an organization prepared to predict, prevent, and mitigate security threats. While your security posture should include any technologies your organization builds, it also must account for all the tech tools in your ecosystem. The proliferation of SaaS applications in modern business has inspired an entirely new category of security: SaaS security posture management,...
Blog

What is Secure Access Service Edge (SASE)?

SASE definedAs defined by Gartner, SASE is a framework designed to integrate security and network connectivity technologies into a unified, cloud-delivered platform to enable the secure and fast adoption of cloud services. Through the convergence of networking and network security, SASE meets the challenges of digital business transformation, edge computing, and workforce mobility.As organizations...
Blog

What are Cloud Misconfigurations?

As we use more and more cloud applications, the more difficult it’s become to maintain and control our multi-cloud environments. Because of this increasing complexity, configuration errors are becoming more and more common — Gartner says that through 2025, 99% of cloud security failures will be caused by misconfiguration errors. To stay on top of your cloud application security and prevent...
Blog

What is a Secure Web Gateway? (SWG)

Secure Web Gateway definedOrganizations use a SWG to protect their employees. A secure web gateway (SWG) is a security solution that prevents unsecured internet traffic from entering an internal network of an organization. It is used by organizations to protect their employees and users from accessing and being infected by malicious web traffic, websites with vulnerabilities, internet-borne...
Blog

SSE vs SASE: How Are They Related?

In order to take advantage of cloud-centric business models, many organizations are considering developing a Secure Access Service Edge (SASE) architecture. But how do you choose the right solution? There is no shortage of vendors selling tools to secure interactions between devices, applications, on-premises resources and infrastructure. As a result, it can be challenging to select the right mix...
Blog

What is Security Service Edge (SSE)?

Security Service Edge is the security stack of SASE (that also includes a networking stack including SD-WAN). A complete SSE stack of cloud security services allows organizations to protect their workforce from internet threats, provides secure and adaptive access to private corporate applications, and protects data across all their cloud platforms and applications.Security Service EdgeThere are 3...
Blog

What is Data Security Posture Management (DSPM)?

Cyber attacks are on the rise. In 2023, a PWC survey revealed an almost 10% increase in data breaches that resulted in over $1 million in damages. Threat actors are constantly adapting their techniques to stay one step ahead, and organizations need all the help they can get to protect their infrastructure from the threat of intrusion.Data security posture management (DSPM) is an essential tool in...
Blog

What is Data Loss Prevention? (DLP)

Data Loss Prevention (DLP) involves a set of technologies and processes used to discover, monitor and control sensitive data. Organizations use DLP to prevent data breaches and comply with regulations such as GDPR, HIPAA, PCI DSS, and others. DLP tools allow security staff and network administrators to set business rules, also known as policies, that determine what's sensitive while also providing...
Blog

BEC Global Insights Report: April 2025

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.