X
Ep. 2 of the Fortress Podcast, Absolutely Critical. When Risk Stops Being Red and Starts Being Real
Listen
Platform
Platform
Fortress Platform
AI powered platform for holistic supply chain defense.
Supply Chain Risk Competitors
Where other platforms leave you with unanswered questions and incomplete risk profiles, Fortress delivers clarity, action, and results.
Data Exchanges
A2V
Gain immediate vendor and assessment intelligence for informed decision making.
NAESAD
Unite industry partners for enhanced collaboration with SBOMs, HBOMs, and more.
Private Catalogs
Leverage private catalogs for organization-exclusive insight and use.
Trusted AI
Harness validated AI to gain better insights and risk mitigation.
AI Monitoring for Vendor Ecosystems
Uncover vendor risks with AI and streamline remediation
AI Monitoring for Products
Leverage AI to discover and address product risks
Featured post
Q2 2025 Threat Intelligence Report
Jul 25, 2025
Commercial
Commercial
Industry Collaboration
A2V
Industry leader collaborative for improved vendor and asset insights.
NAESAD
Join forces with industry allies for improved intelligence initiatives.
Solution
C-SCRM
Safeguard critical infrastructure from cyber threats.
TPRM
Control and mitigate third-party supply chain risks.
Vulnerability Management
Identify and resolve critical cyber security vulnerabilities.
Software Supply Chain Security
Secure software from production to deployment.
GRC
Optimize GRC workflows and response
PPA
Gain mission-critical visibility with in-depth evaluations of your hardware and software assets with Product Provenance Assessment.
Industries
Overview
Critical Manufacturing
Energy and Utilities
Oil and Gas
Featured post
A Complete Playbook for Third-Party Risk Management
May 19, 2025
Government
Government
Solutions
C-SCRM
Protect vital supply chain assets against nation state threats.
Vulnerability Management
Detect and address key cybersecurity weaknesses.
Software Supply Chain Security
Ensure safe software from government software providers.
PPA
Gain mission-critical visibility with in-depth evaluations of your hardware and software assets with Product Provenance Assessment.
Agencies
Overview
Contract Vehicles
Federal Contractors
GSA SCRIPTS
IDIQ
Featured post
TPRM vs C-SCRM The Differences for Public Sector Leaders
May 1, 2025
Resources
Resource Library
Blog
Events & Webinars
eBooks
Glossary
Reports
Whitepapers
Videos
NVD Analysis Report
Threat Intelligence Hub
Trust Center
Podcast
Featured post
Seven Risk Areas Addressed by SBOMs
Sep 6, 2023
Featured post
On-Demand Webinar | Updates from the CISA SBOM Working Groups
Jul 24, 2023
Company
Company Overview
Leadership
Careers
News
Contact
Featured post
Seven Risk Areas Addressed by SBOMs
Sep 6, 2023
Featured post
Blog | Fortress Brings Awareness to Cybersecurity at DistribuTECH International
May 18, 2022
Platform
Platform
Fortress Platform
AI powered platform for holistic supply chain defense.
Supply Chain Risk Competitors
Where other platforms leave you with unanswered questions and incomplete risk profiles, Fortress delivers clarity, action, and results.
Data Exchanges
A2V
Gain immediate vendor and assessment intelligence for informed decision making.
NAESAD
Unite industry partners for enhanced collaboration with SBOMs, HBOMs, and more.
Private Catalogs
Leverage private catalogs for organization-exclusive insight and use.
Trusted AI
Harness validated AI to gain better insights and risk mitigation.
AI Monitoring for Vendor Ecosystems
Uncover vendor risks with AI and streamline remediation
AI Monitoring for Products
Leverage AI to discover and address product risks
Featured post
Q2 2025 Threat Intelligence Report
Jul 25, 2025
Commercial
Commercial
Industry Collaboration
A2V
Industry leader collaborative for improved vendor and asset insights.
NAESAD
Join forces with industry allies for improved intelligence initiatives.
Solution
C-SCRM
Safeguard critical infrastructure from cyber threats.
TPRM
Control and mitigate third-party supply chain risks.
Vulnerability Management
Identify and resolve critical cyber security vulnerabilities.
Software Supply Chain Security
Secure software from production to deployment.
GRC
Optimize GRC workflows and response
PPA
Gain mission-critical visibility with in-depth evaluations of your hardware and software assets with Product Provenance Assessment.
Industries
Overview
Critical Manufacturing
Energy and Utilities
Oil and Gas
Featured post
A Complete Playbook for Third-Party Risk Management
May 19, 2025
Government
Government
Solutions
C-SCRM
Protect vital supply chain assets against nation state threats.
Vulnerability Management
Detect and address key cybersecurity weaknesses.
Software Supply Chain Security
Ensure safe software from government software providers.
PPA
Gain mission-critical visibility with in-depth evaluations of your hardware and software assets with Product Provenance Assessment.
Agencies
Overview
Contract Vehicles
Federal Contractors
GSA SCRIPTS
IDIQ
Featured post
TPRM vs C-SCRM The Differences for Public Sector Leaders
May 1, 2025
Resources
Resource Library
Blog
Events & Webinars
eBooks
Glossary
Reports
Whitepapers
Videos
NVD Analysis Report
Threat Intelligence Hub
Trust Center
Podcast
Featured post
Seven Risk Areas Addressed by SBOMs
Sep 6, 2023
Featured post
On-Demand Webinar | Updates from the CISA SBOM Working Groups
Jul 24, 2023
Company
Company Overview
Leadership
Careers
News
Contact
Featured post
Seven Risk Areas Addressed by SBOMs
Sep 6, 2023
Featured post
Blog | Fortress Brings Awareness to Cybersecurity at DistribuTECH International
May 18, 2022
Fortress Blog
Get in-depth perspectives and insights for critical infrastructure, public sector organizations, and their digital supply chains straight from the Fortress team.
Author
Fortress Information Security
blog
Energy Utilities: Beware 'Volt Typhoon' Cyber Threats; The Need for Compliance with CIP-010 Standards
Cybersecurity
,
CIP
By
Fortress Information Security
| March 25, 2024
blog
Ensuring Trust in the Digital Age: The Imperative of File Integrity Assurance (FIA)
Cybersecurity
By
Fortress Information Security
| February 20, 2024
blog
Healthcare Industry Focused on Holistic Supply Chain Risk Management and Sharing
By
Fortress Information Security
| February 7, 2024
blog
Is the Cisco XE Vulnerability really gone? We don’t think so.
By
Fortress Information Security
| October 25, 2023
blog
Is Your Vendor‘s Network Secure? Unwinding the Recent Cisco IOS XE Vulnerability
Cybersecurity
By
Fortress Information Security
| October 20, 2023
blog
A Time for Smarter, More Secure Uncrewed Vehicles
By
Fortress Information Security
| June 2, 2023
blog
Incentives for Advanced Cybersecurity Investment
By
Fortress Information Security
| May 23, 2023
blog
A Safe Harbor for Cybersecurity and Resiliency
Cybersecurity
By
Fortress Information Security
| April 13, 2023
blog
The White House Cybersecurity Strategy: A Call for Urgent Focus on Supply Chain Risks
By
Fortress Information Security
| March 14, 2023
blog
Cybersecurity Challenges and Opportunities Discussed at WEST 2023
By
Fortress Information Security
| March 1, 2023
blog
The Cost of Cyber Attacks on Supply Chains
By
Fortress Information Security
| February 3, 2023
blog
Fortress Promotes Supply Chain Risk Management at I/ITSEC 2022
Cybersecurity
By
Fortress Information Security
| December 8, 2022
1
2
3