In his Q&A with VMblog, Antonio Sanchez talked about Fortra’s activities at RSA, highlighting our latest product innovations and sharing industry insights.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Cobalt Strike and Outflank Security Tooling (OST) are two elite red teaming solutions ideal for assessing the security posture of an organization by deploying sophisticated adversary simulations.
Cobalt Strike is a threat emulation tool that provides a post-exploitation agent and covert channels, replicating the tactics and techniques of an advanced adversary in a network. OST is a curated set...
Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) are three powerful security solutions that use the same techniques as today’s threat actors in order to safely evaluate organizational infrastructures and provide guidance on closing security gaps, enhancing defenses, and creating more resilient security strategies.
Core Impact is an automated penetration testing tool, typically...
ORBE Company uses Automate, Fortra's RPA tool, to automate the generation of financial reports for its customers, reducing manual processes and saving time for its team. Read the full case study.
OST is a curated set of offensive security tools created by expert red teamers. Ideal for advanced security teams testing even mature and sensitive target environments, this toolkit covers every significant step in the attacker kill chain, from difficult stages such as initial access to final exfiltration.
Prioritizing Stealth and Evasion
One of the key challenges that red teams face today is...
In his January contribution to Forbes Advisor, John Wilson discusses smartphone scams and shares 8 steps individuals and organizations can take to protect themselves.
What’s in store for the IBM i community in 2023? Find out in part 2 of IT Jungle’s prediction series featuring Fortra’s Robin Tatam and Amneris Teruel.
In this SecurityInfoWatch.com article, Wade Barisoff discusses Cybersecurity Maturity Model Certification (CMMC) standards and how organizations can comply with them.
In this Channel Futures guest blog, Renee Ritter looks at how businesses can recalibrate their approach to security and optimize process in order to move forward.