Cyber GRC with the Risk and Compliance Module

Tour the Risk and Compliance Module Streamline your Cyber GRC and Compliance Management Manage your own cybersecurity gap assessments, risk and compliance assessments for leading IT & security compliance frameworks and risk register. The risk and compliance module can use the assessment findings from the attack surface management module to populate the Security Risk and […]

HHS Proposed HIPAA Security Rule Updates

image for HHS Proposed Rule blog post

HHS has released proposed updates on the HIPAA Security Rule. These updates are aimed at equipping healthcare organizations with more robust tools and practices to safeguard ePHI.

Platform UI Change Video Tour

Video Tour: Platform UI Navigation Changes This 7 minute video will walk you through the upcoming navigation changes to the FortifyData platform’s user interface (UI).  https://youtu.be/xXQ-7AhUi0YVideo Chapter Time Stamps: 0:00 – 0:36 – Introduction 00:38 – 2:36 – Attack Surface Management Module (formerly Enterprise Risk Module) updated top row navigation Asset discovery for external attack […]

One Platform Continuous Visibility Total Protection

One Platform. Continuous Visibility. Total Protection Discover how FortifyData has evolved into a comprehensive cyber risk management platform, offering powerful modules like Attack Surface Management, Continuous Threat Exposure Monitoring, Risk and Compliance Automation, and Third-Party Cybersecurity Risk Management. Guided by AVA, our AI Assistant, this video highlights FortifyData’s seamless integrations, real-time risk insights, automated workflows, […]

FortifyData Achieves SOC 2 Type 2 Compliance Certification

image for FortifyData achieving SOC 2 Type 2 compliance certification

FortifyData Achieves SOC 2 Type II Compliance Certification Independent audit validates FortifyData meets the highest standards for security and availability. ACWORTH, GA, January 3, 2025  – FortifyData an automated cybersecurity risk management and Cyber GRC platform today announced the successful completion of the System and Organization Controls (SOC) 2 Type II audit, achieving compliance with […]

Campus CyberCast: A discussion with Chris Schreiber and December Vulnerabilities

December Campus CyberCast thumbnail Chris S

Campus CyberCast: A discussion with Chris Schreiber, December Vulnerabilities, Sustainable Cyber Program Investments This episode of the Campus CyberCast we speak with Chris Schreiber at CyberBridge and CampusCISO. Chris is the former CISO at University of Chicago, University of Arizona and University of Wisconsin-Whitewater.  Chris shares his insights on the current challenges in cybersecurity at […]

Higher Education Cyber Threat and Vulnerability Forecast December 2024

Cover image for December 2024 higher education cyber threat forecast report

Cyber Threat and Vulnerability Forecast Report December 2024 This report leverages insights from November and early December’s threat landscape to proactively guide institutions in addressing these vulnerabilities as the new academic year starts. Complete the form to get the report. > 3 Critical Ransomware-linked KVEs > 26 KVEs in this months report, which are impacting […]

Campus Technology and THE Journal Award FortifyData Product of the Year

Product of the year image for article

Campus Technology and THE Journal Award FortifyData Product of the Year November 20, 2024 Atlanta, GA, November 20, 2024 — FortifyData, a leading provider of automated cyber risk management solutions, is proud to announce that it has been named the Product of the Year in the category of cybersecurity risk management by Campus Technology and […]

Higher Education Cyber Threat Vulnerability Forecast November 2024

November 2024 higher education cyber threat report image

Top 5 Threats & Vulnerabilities In Higher Education Institutions This report leverages insights from October’s threat landscape – including commonly identified KEVs and known vulnerabilities that have been used in a ransomware attack – to proactively guide institutions in addressing these vulnerabilities. Complete the form to get the report. > Ransomware linked vulnerabilities. > Top […]