Resources

Blog

What is IT Process Automation? How to Build a More Resilient IT Department

As IT environments grow increasingly complex—and budgets and staff resources shrink—IT teams everywhere are looking for ways to fill the gaps. And they’re turning to IT process automation software. In fact, per Fortra’s recent IT automation survey, 72 percent of users say they’re looking to expand automation within the next year. Curious how your IT department can utilize a process automation...
Blog

Patch Tuesday Update September 2023

This is my 211th Patch Tuesday in a role where I’m performing a complete analysis of the released Microsoft patches. It’s amusing to me to see what has changed and what has stayed the same.
Blog

What Is Cloud Security?

Cloud security is the collection of plans, processes, and technologies that allow you to safely manipulate cloud-based data at rest, in use, and in motion. A comprehensive cloud-based security strategy encompasses several key elements.
Blog

Evolve Your Security Strategy to Prepare for DORA

Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog

Supply Chain Risk

The supply chains of today’s global economy rely heavily on technology and information systems to deliver finished goods and services to the end user. However, for all the benefits of a hyperconnected economy this introduces, supply chains also carry with them a high degree of risk.
Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals,...
Blog

Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy

Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog

Key Insights for Zero Trust in 2023

With the release of the 2023 Zero Trust Security Report, it’s a good time to reflect on the seismic shifts that have happened in the industry regarding network security. Discover key insights and impacts of Zero Trust in 2023.
Blog

How to Automate Login to a Website and Download a File

If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
Blog

Exploring the 2023 Penetration Testing Report: 5 Key Findings

Each year the threat landscape continues to evolve, and security measures must evolve with it. Recently released, Fortra’s 2023 Penetration Testing Report offers a view into the usage and perception of pen testing, with the intent to determine how these services must adapt in the future. Explore a few salient points in this edition that betrayed changes in the penetration testing landscape.