The cybersecurity skills shortage is not just an ongoing inconvenience—it is a serious vulnerability that can be exploited by attackers. But how can organizations go about patching this gap while the talent gap endures? The answer lies in leveraging the resources you already have on hand: your existing workforce. How do you transform your existing personnel to meet today’s cybersecurity demands?...
From new trends in ransomware to the way GenAI is shaping the security landscape, RSA 2024 brought together the best thought leadership in cybersecurity to tackle the tough issues.
As the world ramps up for the Paris Olympics, cyber-warriors pull out all the stops to defend against an unprecedented wave of impending threats. Find out who is most likely to attack and what global cybersecurity defenders are doing to prepare.
How to Get the Most Out of Cybersecurity Best Practice FrameworksFrameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your...
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
This month everyone is going to be talking about CVE-2024-30051 since it is known that it is being used in QakBot and other malware. This is an update that should be applied as soon as possible given the nature of the vulnerability and the fact that real world exploitation has been confirmed.
When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
This year, Verizon revealed record-high confirmed data breaches and started tracking third-party incidents for the first time. Find out what else is new as we review the highlights of the Verizon 2024 DBIR.
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation. ...
The first thing that anyone looking at the Microsoft security guidance this month will notice is the inclusion of Common Weakness Enumeration (CWE) information.
It is the largest phishing simulation in the world: Fortra’s Terranova Security’s yearly Gone Phishing Tournament (GPT) tests over 1.37 million end users across 142 countries and 31 languages. The results don’t lie – but this year they may be surprising.
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.