Blog

Blog

What's It Like to Be in Marketing at Fortra?

The Fortra Marketing team is known for its commitment to producing great content with great people. Hear from some of our amazing marketing leads and specialists about their day-to-day and why they love what they do.
Blog

From Intern to Software Engineer I: Megan O.

As her software engineering internship wrapped up in 2021, Megan knew Fortra was where she wanted to be. Hear how she got connected with the company and why she’s passionate about the culture. Tell us about your internship experience!
Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?
Blog

Develop a Comprehensive Cybersecurity Risk Management Strategy, Starting with Vulnerability Management

Layered Cybersecurity: A Must For Any OrganizationProtecting your company, your clients, and yourself requires a strong, comprehensive cybersecurity program that accommodates the vast and evolving digital landscape. Having the right layered security strategy in place ensures you’re protecting the whole of your business, not just select areas.Understanding the Changing Threat LandscapeCyber threats...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Blog

Application Security Tips for PCI-DSS 4.0

PCI-DSS has long been the standard for securing payment card-related information. Meeting this bar was the bare minimum requirement for showing that an organization had sufficient controls to keep this data secure. With changes to PCI-DSS already being released and required by 2024, organizations developing and running applications to collect or process payment card-related data need to get...
Blog

Automotive Industries Article

By 2024, it’s predicted there’ll be more than 400 million connected vehicles in use around the world. In Automotive Industries magazine, Aviram Jenik discusses the implications for cybersecurity and looks at how rigorous testing and standard protocols can elevate the safety of these fast-evolving vehicles. Originally published in Automotive Industries. Excerpt:“Industry regulators are meeting the...
Blog

Unexpected Possibilities as Part of Fortra: Brian Pick

In the years since Fortra acquired Brian Pick’s tight-knit software company, he and his Managed File Transfer colleagues have grown in many ways. Discover how Brian’s own career—and the company’s growth—have really taken off.