Navigating the EU’s Digital Operational Resilience Act (DORA) with FortifyData

Navigating the EU’s Digital Operational Resilience Act (DORA) with FortifyData The European Union’s Digital Operational Resilience Act (DORA), announced in September 2020, is set to usher in a new era of cybersecurity management for financial organizations. As cybersecurity threats continue to evolve, the EU has responded with DORA to bolster digital operational resilience and ensure […]

Continuous Threat Exposure Management – The 6 Aspects You’ll Need to Address

Continuous Threat Exposure Management – The 6 Aspects You’ll Need to Address Continuous Threat Exposure Management (CTEM) is an approach to cyber risk management that is gaining popularity as it presents a comprehensive and cyclical program for identifying and mitigating cyber risks.   Many organizations already have a component or two of CTEM program in place, […]

Finding and Managing the Cyber Risk in the Higher Education Third-Party Ecosystem

Finding and Managing the Cyber Risk in the Higher Education Third-Party Ecosystem Higher education institutions have become increasingly reliant on third-party vendors for a range of services, including cloud computing, online learning platforms, and student information systems. While these relationships bring many benefits, they also introduce new cybersecurity risks that must be managed effectively. That’s why […]

4 Steps to Attack Surface Management

4 Steps to Attack Surface Management Businesses face a wide range of cyber threats that can compromise their sensitive data and disrupt their operations. As the number and sophistication of these threats continue to increase, it is increasingly important for businesses to implement effective strategies for identifying their attack surface so they can take appropriate […]

Top Third-Party Data Breaches in 2023

Top Third-Party Data Breaches in 2023 Last updated December 4, 2023 Third-party data breaches have become an all-too-common occurrence, underscoring the importance of cybersecurity programs that include a vendor or third-party cyber risk management component. The history of third-party data breaches can be traced back to the early days of the internet. As online transactions […]

The FTC Safeguards Rule Amendment Now Includes Your Business  

The FTC Safeguards Rule Amendment Now Includes Your Business   Here is How Your Company Can Comply  The FTC Safeguards Rule will be applied to many new industries beyond traditional financial services organizations. The Federal Trade Commission (FTC) has been preparing to amend the GLBA Safeguards Rule for protection of customer data. The Safeguards Rule is […]

TPRM in 10 Days

TPRM in 10 Days – Guaranteed You need a TPRM Program NOW Old methods of building a TPRM no longer work Migrate to an agile TPRM Program NOW There’s a much better way to build a TPRM Program FortifyData can get you started in 10 Days – Guaranteed! You need a TPRM program now Third-Party […]

Penetration Testing vs Vulnerability Assessments: Understanding the Differences 

Penetration Testing vs Vulnerability Assessments: Understanding the Differences Penetration testing and vulnerability assessments are two important components of any organization’s cybersecurity strategy. Both aim to identify potential security risks, but they do so in different ways. Understanding the difference between these two methods is essential to developing a comprehensive security plan that protects your organization’s […]

What is the FTC Safeguards Rule and How Can Higher Education Institutions Comply

What is the FTC Safeguards Rule and How Can Higher Education Institutions Comply? The FTC Safeguards Rule will be applied to Title IV institutions based on an upcoming change to the rule that will add higher education institutions to the scope and impose requirements on institutional cybersecurity programs.   The Federal Trade Commission (FTC) has […]