Fortress Information Security

Fortress Information Security partners with NetRise to secure software supply chains
Fortress Information Security and NetRise partnered to offer a new, innovative Software Bill of Materials (SBOM) transparency solution to secure software supply chains and …

Fortress Information Security collaborates with ONG-ISAC to improve supply chain cybersecurity
Fortress Information Security and the Oil and Natural Gas Information Sharing Analysis Center (ONG-ISAC) announced an industry-wide initiative focused on securing hardware and …

Fortress Information Security and NetRise form a partnership to extend XIoT offering
NetRise and Fortress Information Security form a strategic partnership. This partnership gives Fortress Information Security’s global customers access to the firmware …

Fortress Information Security’s new Trust Center allows suppliers to share cybersecurity information
Fortress Information Security has unveiled a new way for suppliers to connect with their customers and provide pivotal information about their supply chain security practices. …

Fortress Information Security names Betsy Soehren-Jones as COO
Betsy Soehren-Jones has been named Chief Operation Officer (COO) of Fortress Information Security, a supply chain cybersecurity provider for critical infrastructure …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility