Blog
Creating a World of Possibility for Fortra's Global Partners: Renee Ritter
Thu, 04/13/2023
Last year, Renee and her team introduced a new partner program and led partners through the rebrand to Fortra. Here's her take on these achievements and a look at the strategic shifts that will be required for cybersecurity moving forward.
Blog
Supply Chain Compromise: The Risks You Need to Know
Tue, 04/11/2023
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Blog
A Day in the Life of a SOC Team
Thu, 04/06/2023
Managed detection and response (MDR) would be nothing without a SOC (security operations center). These are the people who make Alert Logic's MDR services so dependable. It’s time you met them.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog
Stopping Cybercriminals From Abusing Security Tools
By Amy Hogan-Burney on Thu, 04/06/2023
Microsoft’s Digital Crimes Unit (DCU), cybersecurity software company Fortra™ and Health Information Sharing and Analysis Center (Health-ISAC) are taking technical and legal action to disrupt cracked, legacy copies of Cobalt Strike and abused Microsoft software, which have been used by cybercriminals to distribute malware, including ransomware. This is a change in the way DCU has worked in the...
Blog
3 Tips to Strengthen AWS Container Security
Thu, 04/06/2023
Containers are fundamental to swift, reliable AWS deployment. So, how can you strengthen AWS container security?
Blog
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To?
Mon, 03/27/2023
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
Blog
ChatGPT: Understanding and Mitigating the Cybersecurity Risks
By Antonio Sanchez on Wed, 03/08/2023
There’s a lot of talk about ChatGPT. While there are many positive and interesting applications, cybersecurity experts are worried about how threat actors will employ this tech. Learn about two potential use cases and how organizations can prepare.
Blog
Think Like a Threat Actor to Identify Your Cybersecurity Blind Spots
By Antonio Sanchez on Wed, 03/08/2023
In a recent penetration test, the Fortra team was able to harvest enough credentials from a customer to know a savvy threat actor could take down their domain. Discover why testing your organization’s defenses is essential to offensive security.
Blog
How to Meet Cyber Insurance Requirements for IBM i
Thu, 03/02/2023
Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Blog
What is DORA and How Can You Achieve Compliance?
Tue, 02/28/2023
When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Blog
Workload Automation (WLA) vs. Robotic Process Automation (RPA)
Wed, 02/15/2023
Automation remains a popular technology for businesses of all kinds. Within the realm of automation, there are a lot of acronyms representing different tools and approaches—two of the most common are workload automation (WLA) and robotic process automation (RPA). As you plan your strategy, it’s important to understand the differences of workload automation vs. robotic process automation.
Both...
Blog
Are Cybersecurity and Data Protection Now Integral to Business Success?
Mon, 02/06/2023
A famous front cover of The Economist in 2017 declared that the 'world’s most valuable resource is no longer oil, but data.' The value of data has indeed increased significantly. Organizations rely on data and data analytics for almost every facet of their operations and use it to make insightful decisions to help move the business forward.
Many have invested in the tools and solutions - AI, CRM,...
Blog
Acquisition Enables a Return to Form: Chris Bailey
Fri, 01/27/2023
When Fortra acquired FileCatalyst, Chris Bailey eagerly traded his CEO hat for the chance to get back to his first love: product management. Now he uses his expertise to inform the direction of the company’s popular Secure File Transfer solutions.
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Blog
Pursuing a New Career Path: Wes Byron
Fri, 01/20/2023
Wes Byron knows it’s never too late to change careers. Fortra gave him the opportunity to pursue his interest in product documentation, and now this dedicated technical writer enjoys supporting customers in a challenging new way.