Blog
Exploring the 2023 Penetration Testing Report: 5 Key Findings
Mon, 04/17/2023
Each year the threat landscape continues to evolve, and security measures must evolve with it. Recently released, Fortra’s 2023 Penetration Testing Report offers a view into the usage and perception of pen testing, with the intent to determine how these services must adapt in the future. Explore a few salient points in this edition that betrayed changes in the penetration testing landscape.
Blog
Creating a World of Possibility for Fortra's Global Partners: Renee Ritter
Thu, 04/13/2023
Last year, Renee and her team introduced a new partner program and led partners through the rebrand to Fortra. Here's her take on these achievements and a look at the strategic shifts that will be required for cybersecurity moving forward.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog
ChatGPT: Understanding and Mitigating the Cybersecurity Risks
By Antonio Sanchez on Wed, 03/08/2023
There’s a lot of talk about ChatGPT. While there are many positive and interesting applications, cybersecurity experts are worried about how threat actors will employ this tech. Learn about two potential use cases and how organizations can prepare.
Blog
Think Like a Threat Actor to Identify Your Cybersecurity Blind Spots
By Antonio Sanchez on Wed, 03/08/2023
In a recent penetration test, the Fortra team was able to harvest enough credentials from a customer to know a savvy threat actor could take down their domain. Discover why testing your organization’s defenses is essential to offensive security.
Blog
Vintage Vulnerabilities: New Attacks Exploiting Old Weaknesses
Mon, 03/06/2023
Popular entertainment would have us believe that hackers are all sophisticated attackers using cutting edge techniques to exploit the latest vulnerabilities. That is sometimes true, but it’s become increasingly apparent that whether it’s the latest zero-day or something that was discovered the same year Apple released the iPad, hackers are equal-opportunity offenders. "Classic"...
Blog
How to Meet Cyber Insurance Requirements for IBM i
Thu, 03/02/2023
Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Blog
What is DORA and How Can You Achieve Compliance?
Tue, 02/28/2023
When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Blog
Acquisition Enables a Return to Form: Chris Bailey
Fri, 01/27/2023
When Fortra acquired FileCatalyst, Chris Bailey eagerly traded his CEO hat for the chance to get back to his first love: product management. Now he uses his expertise to inform the direction of the company’s popular Secure File Transfer solutions.
Blog
Pursuing a New Career Path: Wes Byron
Fri, 01/20/2023
Wes Byron knows it’s never too late to change careers. Fortra gave him the opportunity to pursue his interest in product documentation, and now this dedicated technical writer enjoys supporting customers in a challenging new way.
Blog
What is a Supply Chain Attack and How Can Organizations Defend Against Them?
Wed, 01/18/2023
Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as a developer, distributor, or...
Blog
What is the Relationship Between Ransomware and Phishing?
Tue, 01/10/2023
Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result. Ransomware and Phishing – a match made in heaven Phishing is the number one delivery vehicle for ransomware,...
Blog
Putting a Hug Around Acquisitions: Donnie MacColl
Wed, 01/04/2023
Donnie MacColl says Fortra makes acquisitions successful by putting a hug around the companies it welcomes to the family. Discover why the senior director of technical services and GDPR data protection officer says he’s never been happier at work.
Blog
What’s It Like to Be in Customer Operations at Fortra?
Wed, 12/21/2022
Our Customer Operations team helps build positive, long-lasting customer relationships. Learn how these specialists handle maintenance renewals, account updates, and licensing changes—and why they love virtual team coffee breaks.
Blog
3 Reasons to Take a Layered Approach to Offensive Cybersecurity
Mon, 12/19/2022
Reports of cyberattacks continue to plague the news, from attacks on airport computer systems¹, to increased phishing scams around the holidays2, to new ransomware groups entering the landscape at greater attack volumes³. The increase of attacks, both in volume and severity, means your company needs the utmost protection - a single program or system simply won’t cut it anymore.A layered approach...
Blog
A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
Fri, 12/16/2022
In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with...
Blog
How to Recognize and Respond to Emerging Social Media Cybersecurity Threats
Wed, 12/07/2022
Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note, embracing these communication channels wholeheartedly to reach vast audiences quickly,...