-
Unleashing the Power of Zero Trust Segmentation: Why Your Organization Can't Afford to Ignore This Critical Security Strategy
The journey of macro and micro segmentation of the Zero Trust framework can be a massive undertaking. Many organizations Read More -
The Key to Proactive Cybersecurity: A Primer on Thinkst Canary Decoy Technology
Thinkst Canary's advanced threat detection solution uses decoys, or "canaries," to lure cyber criminals into a controlle Read More -
Fortis Knox Uses Automation and Managed Services to Protect Your Critical Data
Immutable backups are a standard part of most security programs today. Unfortunately, immutable backups are not the eas Read More -
Introducing Fortis Adaptive Threat Response
Fortis Adaptive Threat Response is an exciting new automation-based, 100% free add-on feature available to Fortis Active Read More -
Fortis Security Advisory: Microsoft Confirms New Exchange Zero-Day Vulnerabilities
Executive SummaryThe Fortis Threat Intelligence Team has been monitoring the emerging news of active exploitation of two Read More -
The Challenges of IoMT and Healthcare Security
By now, most of us own smart devices of some kind. Whether you use a voice-activated home assistant like an Amazon Echo Read More -
Fortis Security Advisory: Cisco Reports Corporate Network Breach
Executive SummaryCisco Security Incident Response and Cisco Talos released information on 8/10/22 regarding a security i Read More -
A Closer Look at SASE
What is SASE?SASE stands for Secure Access Service Edge. It is a cloud-based network infrastructure model built around a Read More -
Happy First Anniversary to Fortis!
Fortis by Sentinel officially launched one year ago this week! We have experienced so many incredible moments and milest Read More -
Fortis Security Advisory: BlackCat/ALPHV
The FBI has released a flash communication to the community sharing indicators of compromise and known tactics, techniqu Read More -
International Agencies Release Joint Cybersecurity Advisory for Global Ransomware Threats
by Ellen McCullough, Fortis Cyber Security Threat AnalystThe FBI, CISA, ACSC, and NCSC-UK have released a joint cybersec Read More -
A Log4j RCE Vulnerability Update
The Fortis Security, Incident Response, and Threat Intelligence teams have been tracking activity related to the recentl Read More -
A Casual Conversation About Phishing
by Sam Conwell, Fortis Incident Response SupervisorI am sure you have already read many technical articles on the danger Read More -
Small Business Tips For Staying Secure While Working From Home
Due to the COVID-19 pandemic, most organizations were forced to quickly adapt to conducting their business and working w Read More -
Large School District Chalks Up A Major Security Upgrade With Fortis
IntroductionOne of the largest high school districts in the country worked with Fortis and Sentinel to implement basic N Read More -
Fortis Helps A Utility Company Restore Their Environment Following An Attack
IntroductionA utility company was having issues with business workflows and production that was impacting their connecti Read More -
Five Important Cybersecurity Training Modules for Your Business
Attackers are always looking for new ways to gain access to your organization’s network and sensitive data. While most o Read More -
A Financial Services Company Invests In A Security Upgrade With Fortis
IntroductionA financial institution was using obsolete perimeter network firewalls in a pair of their data centers, whic Read More