Blog

Blog

From Receptionist to Senior Scrum Master: Dana Halvorson

Dana Halvorson supported grieving families as a funeral director before becoming a Fortra receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.
Blog

Cybersecurity Awareness Month 

October is Cybersecurity Awareness Month Our Cybersecurity Awareness Month Mad Libs for Good game has come to an end! Thanks to those who participated and helped raise funds for three great organizations advancing cybersecurity awareness and education: The Lone Star College Cybersecurity Scholarship Fund , Women Who Code , and TechSoup . No matter what piques your curiosity or speaks to your...
Blog

Alternative to UiPath: Fortra's Automate

As the RPA market has evolved three types of vendors have emerged based on increasing sophistication — and often — greatly increased costs. At one end you’ll find low-code or no-code automation products that offer desktop automation or productivity for individuals but can lack the functionality that would allow automation efforts to grow in number and complexity. At the opposite end, you’ll find...
Blog

Three Action Items to Consider After Completing a Pen Test

In order to complete a successful penetration test , a great deal of time is often spent in the planning stage. Time should also be invested into the post-test process. Going through the results of pen tests provides a great opportunity to discuss plans going forward and revisit your security posture overall. Seeing pen tests as a hoop to jump through and simply checking it off a list as “done”...
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
Blog

From Intern to Email Marketing Specialist: Paola R.

Paola’s Fortra journey started with an online internship posting. Today, the email marketing specialist loves using her native Spanish at work and remembers the pivotal project where everything clicked. What’s your favorite internship memory?
Blog

Cybersecurity Quiz: Security Solutions 101

Are you shopping for security solutions for your organization but aren't sure where to begin? Start by taking our cybersecurity quiz to test your knowledge.
Blog

What's It Like to Be in Marketing at Fortra?

The Fortra Marketing team is known for its commitment to producing great content with great people. Hear from some of our amazing marketing leads and specialists about their day-to-day and why they love what they do.
Blog

From Intern to Software Engineer I: Megan O.

As her software engineering internship wrapped up in 2021, Megan knew Fortra was where she wanted to be. Hear how she got connected with the company and why she’s passionate about the culture. Tell us about your internship experience!
Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?
Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time and resources on it...
Blog

What is SIEM? How It Works, Best Practices for Implementation & More

Learn about Security Information and Event Management or SIEM, how an organization can get the most out of its SIEM technology and best practices for implementing a solution in this blog. SIEM, or Security Information and Event Management, is a type of software solution that provides threat detection, real-time security analytics, and incident response to organizations. It’s a popular IT security...
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.