Blog
What is DORA and How Can You Achieve Compliance?
Tue, 02/28/2023
When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Blog
Workload Automation (WLA) vs. Robotic Process Automation (RPA)
Wed, 02/15/2023
Automation remains a popular technology for businesses of all kinds. Within the realm of automation, there are a lot of acronyms representing different tools and approaches—two of the most common are workload automation (WLA) and robotic process automation (RPA). As you plan your strategy, it’s important to understand the differences of workload automation vs. robotic process automation.
Both...
Blog
Acquisition Enables a Return to Form: Chris Bailey
Fri, 01/27/2023
When Fortra acquired FileCatalyst, Chris Bailey eagerly traded his CEO hat for the chance to get back to his first love: product management. Now he uses his expertise to inform the direction of the company’s popular Secure File Transfer solutions.
Blog
Pursuing a New Career Path: Wes Byron
Fri, 01/20/2023
Wes Byron knows it’s never too late to change careers. Fortra gave him the opportunity to pursue his interest in product documentation, and now this dedicated technical writer enjoys supporting customers in a challenging new way.
Blog
What is a Supply Chain Attack and How Can Organizations Defend Against Them?
Wed, 01/18/2023
Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as a developer, distributor, or...
Blog
What is the Relationship Between Ransomware and Phishing?
Tue, 01/10/2023
Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result. Ransomware and Phishing – a match made in heaven Phishing is the number one delivery vehicle for ransomware,...
Blog
Putting a Hug Around Acquisitions: Donnie MacColl
Wed, 01/04/2023
Donnie MacColl says Fortra makes acquisitions successful by putting a hug around the companies it welcomes to the family. Discover why the senior director of technical services and GDPR data protection officer says he’s never been happier at work.
Blog
What’s It Like to Be in Customer Operations at Fortra?
Wed, 12/21/2022
Our Customer Operations team helps build positive, long-lasting customer relationships. Learn how these specialists handle maintenance renewals, account updates, and licensing changes—and why they love virtual team coffee breaks.
Blog
3 Reasons to Take a Layered Approach to Offensive Cybersecurity
Mon, 12/19/2022
Reports of cyberattacks continue to plague the news, from attacks on airport computer systems¹, to increased phishing scams around the holidays2, to new ransomware groups entering the landscape at greater attack volumes³. The increase of attacks, both in volume and severity, means your company needs the utmost protection - a single program or system simply won’t cut it anymore.A layered approach...
Blog
A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
Fri, 12/16/2022
In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with...
Blog
How to Recognize and Respond to Emerging Social Media Cybersecurity Threats
Wed, 12/07/2022
Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note, embracing these communication channels wholeheartedly to reach vast audiences quickly,...
Blog
From HR Generalist to Sr. Director of HR: Jordan Bengtson
Sun, 11/20/2022
Jordan Bengtson, senior director of HR at Fortra, truly enjoys the global team he leads and the strategic initiatives he has managed. Hear how the company’s growth has given him opportunities for advancement and what advice he has for new hires.
Blog
Making an Impact Every Day: Renee Ritter
Sun, 11/20/2022
Renee Ritter oversees global partner relationships as channel vice president. Learn about the acquisition that brought her to Fortra and why she praises the unapologetically high bar the company sets for its culture.
Blog
What’s It Like to Be a Business Development Representative at Fortra?
Sun, 11/20/2022
Fortra's business development reps introduce new organizations to the company’s cybersecurity and automation solutions. Learn how these energetic and knowledgeable pros build collaboration, ongoing learning, and fun into their busy days.
Blog
The Challenges and Opportunities of the Modern CISO: Chris Reffkin
Fri, 11/18/2022
As CISO for Fortra, Chris Reffkin spends a great deal of time thinking about security and what the industry can do to get more efficient and effective with the right focus.
Blog
Automation vs Hyperautomation: Learn the Differences
Thu, 11/10/2022
Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation.
Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...