Technology Association of Georgia (TAG) names FortifyData to their Top 40 Innovative Companies of Georgia
Technology Association of Georgia (TAG) Names FortifyData to their Top 40 Innovative Companies of Georgia April 15, 2025 ATLANTA, GA, April 15, 2025 – As a leading Cyber GRC and vulnerability management platform we are honored to be recognized by the Technology Association of Georgia (TAG) as one of the top innovative companies of Georgia […]
Cyber GRC with the Risk and Compliance Module
Tour the Risk and Compliance Module Streamline your Cyber GRC and Compliance Management Manage your own cybersecurity gap assessments, risk and compliance assessments for leading IT & security compliance frameworks and risk register. The risk and compliance module can use the assessment findings from the attack surface management module to populate the Security Risk and […]
HHS Proposed HIPAA Security Rule Updates
HHS has released proposed updates on the HIPAA Security Rule. These updates are aimed at equipping healthcare organizations with more robust tools and practices to safeguard ePHI.
Platform UI Change Video Tour
Video Tour: Platform UI Navigation Changes This 7 minute video will walk you through the upcoming navigation changes to the FortifyData platform’s user interface (UI). https://youtu.be/xXQ-7AhUi0YVideo Chapter Time Stamps: 0:00 – 0:36 – Introduction 00:38 – 2:36 – Attack Surface Management Module (formerly Enterprise Risk Module) updated top row navigation Asset discovery for external attack […]
One Platform Continuous Visibility Total Protection
One Platform. Continuous Visibility. Total Protection Discover how FortifyData has evolved into a comprehensive cyber risk management platform, offering powerful modules like Attack Surface Management, Continuous Threat Exposure Monitoring, Risk and Compliance Automation, and Third-Party Cybersecurity Risk Management. Guided by AVA, our AI Assistant, this video highlights FortifyData’s seamless integrations, real-time risk insights, automated workflows, […]
FortifyData Achieves SOC 2 Type 2 Compliance Certification
FortifyData Achieves SOC 2 Type II Compliance Certification Independent audit validates FortifyData meets the highest standards for security and availability. ACWORTH, GA, January 3, 2025 – FortifyData an automated cybersecurity risk management and Cyber GRC platform today announced the successful completion of the System and Organization Controls (SOC) 2 Type II audit, achieving compliance with […]
Campus CyberCast: A discussion with Chris Schreiber and December Vulnerabilities
Campus CyberCast: A discussion with Chris Schreiber, December Vulnerabilities, Sustainable Cyber Program Investments This episode of the Campus CyberCast we speak with Chris Schreiber at CyberBridge and CampusCISO. Chris is the former CISO at University of Chicago, University of Arizona and University of Wisconsin-Whitewater. Chris shares his insights on the current challenges in cybersecurity at […]
Higher Education Cyber Threat and Vulnerability Forecast December 2024
Cyber Threat and Vulnerability Forecast Report December 2024 This report leverages insights from November and early December’s threat landscape to proactively guide institutions in addressing these vulnerabilities as the new academic year starts. Complete the form to get the report. > 3 Critical Ransomware-linked KVEs > 26 KVEs in this months report, which are impacting […]
Campus Technology and THE Journal Award FortifyData Product of the Year
Campus Technology and THE Journal Award FortifyData Product of the Year November 20, 2024 Atlanta, GA, November 20, 2024 — FortifyData, a leading provider of automated cyber risk management solutions, is proud to announce that it has been named the Product of the Year in the category of cybersecurity risk management by Campus Technology and […]
Higher Education Cyber Threat Vulnerability Forecast November 2024
Top 5 Threats & Vulnerabilities In Higher Education Institutions This report leverages insights from October’s threat landscape – including commonly identified KEVs and known vulnerabilities that have been used in a ransomware attack – to proactively guide institutions in addressing these vulnerabilities. Complete the form to get the report. > Ransomware linked vulnerabilities. > Top […]