In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
In his Q&A with VMblog, Antonio Sanchez talked about Fortra’s activities at RSA, highlighting our latest product innovations and sharing industry insights.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Over the years, penetration testing has become an integral component in proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved...
Find out how 400 cybersecurity professionals are prioritizing and implementing a zero trust security approach, as well as tips and insights into getting started, in this 2023 report sponsored by Cybersecurity Insiders and Fortra.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
In his January contribution to Forbes Advisor, John Wilson discusses smartphone scams and shares 8 steps individuals and organizations can take to protect themselves.
What’s in store for the IBM i community in 2023? Find out in part 2 of IT Jungle’s prediction series featuring Fortra’s Robin Tatam and Amneris Teruel.
In this SecurityInfoWatch.com article, Wade Barisoff discusses Cybersecurity Maturity Model Certification (CMMC) standards and how organizations can comply with them.
In this Channel Futures guest blog, Renee Ritter looks at how businesses can recalibrate their approach to security and optimize process in order to move forward.
In this Digitalisation World article, Chris Bailey discusses Secure File Transfer solutions and how Digitial Rights Management (DRM) plays a key role in protecting an organization’s sensitive data even after it has been transferred.