Post Grid

Creating custom Responsive Post Grids with Fortuna is a breeze! Fully customize the looks of your grids, add them to any page, filter the items you want to display, manage the output and sub-items displayed like date, image, excerpt, Read More link etc. Check out some of the modification options below as well as a few examples further down the page.

Features

What elements to show (Pic, Title, Excerpt, Date, Link etc.)
Regular/Boxed style presets
Image Hover Effect (4 Style Presets available)
Grid column count (4 Style Presets available)
Date Style Presets (2 Style Presets available)
Custom Query/Filter for the Items displayed
Total Items in Grid
Spacing between items (None, Small and Large)
CSS animation of the items
Category Query Filter
Order and Order By clauses
Overwrite image size

Post Grid Example #1

Number of data breaches has gone up, but data security is still not top priority

On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical ...

Read more

SECUDE’s HALOCORE is Now Live for Purchase on SAP® App Center

SECUDE, SAP partner and a leading data security provider specializing in security for SAP and CAD ...

Read more

Three Simple Tips to Keep Your CAD Files Safe and Secure

In the world of manufacturing and high-tech companies the most critical IP, like details of either ...

Read more

A stable SAP data security policy is imperative to implement GDPR

SAP customers are concerned about identification of data in the SAP system, their pseudonymisation in ...

Read more

SAP and Oracle applications are increasingly being targeted by hackers

Cyber security companies and the US Department of Homeland Security warn of an increasing number of ...

Read more

Four steps to spot and stop data theft in your SAP landscape

Outsider threats, while still an important consideration in cyber security, account for only 40% of ...

Read more

Data security in times of SAP S/4HANA

In an interview with the E-3 magazine, Andreas Opfer and Holger Huegel describe how companies can ...

Read more

Do you have Microsoft Azure Information Protection? What stops you from using it?

Does your organization use Microsoft Azure Information Protection to protect critical documentation and ...

Read more

We go beyond traditional data leak prevention functionality: Dola Krishna

Organizations are increasingly going ‘Digital’. But this is not without its due share of ...

Read more

Post Grid Example #2

Why Enterprise Digital Rights Management (EDRM) has an edge over Data Loss Prevention (DLP)

Traditionally, enterprises have relied upon Data Loss Protection (DLP) secure sensitive data. However, when it comes to ...

Read more

Is secure data collaboration the next game-changer for enterprises?

Since the dawn of the digital era, enterprises are realizing the importance of accessing more data. Sharing data ...

Read more

The time has come for Zero Trust

As organizations are contemplating the idea of Zero Trust, it’s much more necessary now with the pandemic forcing ...

Read more

10 Data Leaks that have cost even Fortune 500 companies a fortune (2020 Update)

Data is undoubtedly the most important element in an organization. Securing data during these testing pandemic times is ...

Read more

4 Key takeaways for a cyber committed CEO to be Cyber Resilient

Traditional security measures are no longer adequate to reduce cyber risks and threats which are becoming more and more ...

Read more

Cyber Security Transformation requires a Cyber Committed CEO

As enterprises rely more and more on digital technologies in all areas of business, and the attack surface grows, a ...

Read more

Post Grid Example #3

10 Data Leaks that have cost Fortune 500 companies a fortune

Losing data can be a painful–even disastrous– experience. Considering the following 10 ...

Protecting national interests, not just documents: SECUDE’s HALOCORE secures RCI’s PO transactions

SECUDE implemented its HALOCORE solution at the Research Centre Imarat (RCI), a leading ...

Management Musings 2: Protecting evidence at the scene of crime

No crime is perfect. Every thief leaves behind a ‘signature’ – even in the digital ...

Data-centric security: Protecting the lifeblood of your business

It is high time that data security practitioners – CIOs, CISOs and, indeed, even business ...