Newsroom

News Article

​​Cyber Technology Insights: How Fortra’s DSPM Platform Closes the Data Security Gap​

Fortra’s new Data Security Posture Management (DSPM) platform was featured in Cyber Technology Insights. The article explores how the solution closes critical data visibility and protection gaps across hybrid and multi-cloud environments. CEO Matt Reck and Chief Strategy Officer John Grancarich discuss how Fortra’s DSPM advances proactive, intelligence-driven data security.Originally published in ...
News Article

​​What’s Up with Tech: How AI Is Changing Cyberattacks And How Enterprises Can Proactively Test Defenses To Stay Ahead ​

Fortra Chief Strategy Officer John Grancarich joined Evan Kirstel on the What’s Up with Tech podcast to discuss how uniting red and blue team operations creates a proactive cybersecurity model that breaks the attack chain before it starts. John also explored the growing impact of AI on security, a new unified approach to data protection following Fortra’s acquisition of Lookout’s cloud security...
News Article

​​The Hacker News: Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation ​

Fortra’s Alexis Ober was featured in The Hacker News article, “Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation.” The piece explores an ongoing large-scale campaign attributed to a China-linked threat group known as Smishing Triad. Alexis shared insights on how these attackers are evolving to exploit brokerage accounts and manipulate markets through “ramp and dump”...
News Article

INFOGRAPHIC: The CCP’s Cyberwar Machine

China’s cyber threat landscape continues to evolve, with nearly 200 hacker groups linked to the Chinese Communist Party targeting government and private sectors worldwide. In a recent article in The Epoch Times, Fortra’s Bob Erdman discusses the long-term strategies and extensive resources behind these state-sponsored operations.Originally published in ​The Epoch Times.​Excerpt: ​“The danger in...
News Article

The Cultural Shift Behind DSPM: From ‘Collect Everything’ to ‘What’s Necessary’

Fortra’s Chief Strategy Officer John Grancarich was featured in TechNadu discussing how Data Security Posture Management (DSPM) is transforming data protection strategies.Originally published in ​TechNadu.​Excerpt: ​I often come back to the fundamentals, and here I think the fundamental idea is quite simple: you can’t protect what you can’t see. Most organizations still lack full visibility into...
News Article

​​Digital IT News: Decrease Your Organizational Cyber Threats Now​

In celebration of Cybersecurity Awareness Month, Digital IT News gathered expert insights on how organizations can reduce cyber threats. Among those featured is Fortra’s Tyler Reguly, who underscores the importance of creating engaging forums for employees to discuss security incidents and learn from real-world examples.Originally published in ​Digital IT News.​Excerpt: ​“Providing a place where...
News Article

Government Shut-Down Heightens Cybersecurity Risks

A government shutdown can have far-reaching effects on cybersecurity. In Smarter MSP, Rohit Dhamankar explains how slashed federal capacity and stalled information-sharing increase the risk of cyberattacks against critical infrastructure. Rohit notes that MSPs should anticipate slower federal support and be prepared to take on a greater role in defending critical systems.Originally published in ...
News Article

​​4i: Rohit Dhamankar: Offense Is the New Defense

Fortra’s Rohit Dhamankar was featured in 4i discussing why offense is becoming the new defense in cybersecurity. He highlights the company’s “Break the Chain” initiative, the impact of recent acquisitions, and how proactive disruption is reshaping how organizations defend against advanced threats.Originally published in ​4iExcerpt: ​" Our integrated offensive and defensive portfolio lets us see...
News Article

​​Cso: Cisos Advised to Rethink Vulnerability Management as Exploits Sharply Rise​

Tyler Reguly, Senior Manager of Security R&D at Fortra, was featured in a CSO article examining how security teams can adapt to the surge in vulnerabilities. He explains why public data remains a valuable tool for guiding risk-based strategies.Originally published in ​CSO.​Excerpt: ​“The reality is that public sources of intelligence are critical to managing your vulnerabilities,” Reguly argues. ...
News Article

​​Computing Security: Filtering Out the Bad Stuff​

Zachary Travis of Fortra was quoted in Computing Security’s feature “Filtering Out the Bad Stuff,” which explores how organizations can strengthen email security against evolving threats. He explained that while blocking rules and security measures evolve, attackers are always adapting with new scams and tactics.Originally published in ​Computing Security.​Excerpt: ​“By the time blocking rules and...
Press Release

Minnesota Wild And Fortra Announce New, Multi-Year Partnership

SAINT PAUL, Minn. - The Minnesota Wild and Fortra today announced a new, multi-year partnership naming Fortra as an Official Cybersecurity Software provider of the Minnesota Wild. As part of the partnership, the Fortra logo will appear exclusively on the Wild’s away helmets starting this season.“We are excited to announce our new partnership with cybersecurity leader Fortra and welcome them into...
News Article

​​Help Net Security: The State of DMARC Adoption: What 10M Domains Reveal​

John Wilson, Senior Fellow of Threat Research at Fortra, dives into the state of DMARC adoption across the top 10 million domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing, the dangers of misconfigurations like “+all,” and why few organizations enforce strong DMARC policies even years after the standard’s introduction. Wilson shares key research findings, real...
News Article

EoP Flaws Again Lead Microsoft Patch Tuesday

Microsoft’s September 2025 Patch Tuesday addressed 81 vulnerabilities, with elevation of privilege flaws making up nearly half of the total. In coverage by Dark Reading, Fortra’s Tyler Reguly questioned Microsoft’s use of CVE identifiers, noting that the approach could significantly expand how many CVEs are issued each year.Originally published in ​Dark Reading.​Excerpt: ​"CVEs mean that a...