Blog
INFOGRAPHIC: How to Protect Your Data from Smishing and Vishing
Mon, 09/11/2023
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
Blog
What Is Cloud Security?
By Antonio Sanchez on Wed, 09/06/2023
Cloud security is the collection of plans, processes, and technologies that allow you to safely manipulate cloud-based data at rest, in use, and in motion. A comprehensive cloud-based security strategy encompasses several key elements.
Blog
5 Phases of a Successful AP Automation Project
By Greg J. Schmidt on Thu, 08/31/2023
Are you considering AP automation? Here's what you need to know to make your project a success.
Blog
Industry Advice from Fortra’s EVP of Technical Solutions, Tom Huntington
Wed, 08/30/2023
During his nearly 35 years at the company, Tom Huntington, EVP of Technical Solutions, has contributed greatly to Fortra’s growth and vision.
Blog
Accelerating Security Maturity with Fortra Bundles
Tue, 08/29/2023
In The Importance of Layering Offensive Security Solutions, Fortra experts underscore the advantage of developing a single source offensive security tooling portfolio. Read on to find out the necessary ingredients for a proactive strategy and why Fortra’s ability to combine and maximize solutions optimizes security and produces the most effective outcomes.
The Five Elements of an Offensive...
Blog
My Top 5 Takeaways from Black Hat 2023
By Antonio Sanchez on Tue, 08/22/2023
This was the first Black Hat I’ve attended since 2019. It was great seeing old friends, meeting new friends in real life, and learning new things about a fast-moving industry. I was glad to be back, and I took notes. I’ve included my top 5 takeaway list here.
Press Release
Fortra Introduces New Integrations for Offensive Security
Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
Blog
Zero Trust 101: A Guide to Zero Trust Security
Fri, 08/04/2023
Discover the benefits of removing implicit trust and enable your organization to continuously authenticate and authorize data access from anyone, anywhere, always.
Blog
INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks
Wed, 08/02/2023
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog
Cybersecurity Threats Facing Energy and Utilities: What You Need to Know
Tue, 08/01/2023
Utility sectors have a unique set of challenges that make securing them a job for the experts. That’s where Fortra steps in.
Blog
Inside the fight against hackers who disrupted hospitals and jeopardized lives
By Vanessa Ho on Mon, 07/31/2023
Blog
A First-Hand Account of How Email Security Has Changed – And Where It Is Today
By Antonio Sanchez on Fri, 07/28/2023
A 20-year veteran of the industry shares his first-hand account of how email – and email security – has changed over the years and where it is now.
Blog
Evolve Your Security Strategy to Prepare for DORA
By Antonio Sanchez on Thu, 07/27/2023
Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog
Top 10 Takeaways: Verizon 2023 Data Breach Investigations Report
By Antonio Sanchez on Thu, 07/27/2023
We’ve summarized the Verizon 2023 DBIR into top points. Find out which attack methods hackers leveraged to drive breaches and how Fortra can help you stay safe.
Blog
Understanding CVE 2023-30990: The Vulnerability Exploiting the DDM
By Amneris Teruel on Tue, 07/25/2023
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
Blog
Supply Chain Risk
By Antonio Sanchez on Thu, 07/06/2023
The supply chains of today’s global economy rely heavily on technology and information systems to deliver finished goods and services to the end user. However, for all the benefits of a hyperconnected economy this introduces, supply chains also carry with them a high degree of risk.
Blog
Cyber Insurance - Assessing Risks and Securing Your Future
By Antonio Sanchez on Thu, 06/29/2023
Cyber insurance is not the most glittering side of cybersecurity, but it has certainly earned its place in today's security debate.
According to Statista, as of 2021, an average of 48 percent of organizations in selected countries worldwide had cyber insurance, with numbers being slightly higher for countries such as the U.S. (50 percent), Sweden (55 percent), and Austria (66 percent). Current...