Blog

Blog

An IBM i Hacking Tale

Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog

Vintage Vulnerabilities: New Attacks Exploiting Old Weaknesses

Popular entertainment would have us believe that hackers are all sophisticated attackers using cutting edge techniques to exploit the latest vulnerabilities. That is sometimes true, but it’s become increasingly apparent that whether it’s the latest zero-day or something that was discovered the same year Apple released the iPad, hackers are equal-opportunity offenders. "Classic"...
Blog

How to Meet Cyber Insurance Requirements for IBM i

Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Blog

What is DORA and How Can You Achieve Compliance?

When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Blog

Acquisition Enables a Return to Form: Chris Bailey

When Fortra acquired FileCatalyst, Chris Bailey eagerly traded his CEO hat for the chance to get back to his first love: product management. Now he uses his expertise to inform the direction of the company’s popular Secure File Transfer solutions.
Blog

Pursuing a New Career Path: Wes Byron

Wes Byron knows it’s never too late to change careers. Fortra gave him the opportunity to pursue his interest in product documentation, and now this dedicated technical writer enjoys supporting customers in a challenging new way.
Blog

What is a Supply Chain Attack and How Can Organizations Defend Against Them?

Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as a developer, distributor, or...
Blog

What is the Relationship Between Ransomware and Phishing?

Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result. Ransomware and Phishing – a match made in heaven Phishing is the number one delivery vehicle for ransomware,...
Blog

Putting a Hug Around Acquisitions: Donnie MacColl

Donnie MacColl says Fortra makes acquisitions successful by putting a hug around the companies it welcomes to the family. Discover why the senior director of technical services and GDPR data protection officer says he’s never been happier at work.
Blog

What’s It Like to Be in Customer Operations at Fortra?

Our Customer Operations team helps build positive, long-lasting customer relationships. Learn how these specialists handle maintenance renewals, account updates, and licensing changes—and why they love virtual team coffee breaks.
Blog

3 Reasons to Take a Layered Approach to Offensive Cybersecurity

Reports of cyberattacks continue to plague the news, from attacks on airport computer systems¹, to increased phishing scams around the holidays2, to new ransomware groups entering the landscape at greater attack volumes³. The increase of attacks, both in volume and severity, means your company needs the utmost protection - a single program or system simply won’t cut it anymore.A layered approach...
Blog

A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with...
Blog

How to Recognize and Respond to Emerging Social Media Cybersecurity Threats

Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note, embracing these communication channels wholeheartedly to reach vast audiences quickly,...
Blog

From HR Generalist to Sr. Director of HR: Jordan Bengtson

Jordan Bengtson, senior director of HR at Fortra, truly enjoys the global team he leads and the strategic initiatives he has managed. Hear how the company’s growth has given him opportunities for advancement and what advice he has for new hires.
Blog

Making an Impact Every Day: Renee Ritter

Renee Ritter oversees global partner relationships as channel vice president. Learn about the acquisition that brought her to Fortra and why she praises the unapologetically high bar the company sets for its culture.