Terranova Security provides security awareness training that helps organizations build and grow security-aware cultures worldwide. This end goal is accomplished by constructing training programs that leverage our industry-leading course content, which is also supported by real-world phishing simulations.
So much time, effort, and resources are spent defending the perimeter-less network from outside attacks that a key risk factor is often overlooked: the insider threat.
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
When Fortra acquired JAMS in 2018, Jon Spencer embraced the chance to play an expanded leadership role in the company’s automation business. Now he looks back on how open communication helped him feel right at home from day one.
There’s more than one way to automate a process—but results may vary. That’s why it’s critical to understand the different types of process automation so you can determine how to build a workflow that will best meet your goals. Let’s start by discussing unattended vs attended RPA.
In unattended automation scenarios, the bot executes without any human participation. An attended bot, on the other...
Dana Halvorson supported grieving families as a funeral director before becoming a Fortra receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.
Agari, Alert Logic, Digital Defense, Digital Guardian, and Tripwire, all by Fortra, were recognized in Expert Insights’ “Best-Of” Awards for Fall 2022.
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. Fortra's experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.
In this ITPro Today case study, find out why Summit Credit Union adopted robotic process automation (RPA) technology to streamline and improve an outdated online loan application process.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his guest essay for The Last Watchdog, Eric George, Director of Solutions Engineering at PhishLabs by Fortra, explains what ransomware is, who the high-stake threat actors are, and how organizations can defend themselves against ransomware attacks.
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.
As the RPA market has evolved three types of vendors have emerged based on increasing sophistication — and often — greatly increased costs. At one end you’ll find low-code or no-code automation products that offer desktop automation or productivity for individuals but can lack the functionality that would allow automation efforts to grow in number and complexity. At the opposite end, you’ll find...
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
After Fortra acquired Digital Defense, Mieng Lim embraced remote work and the continuation of the family-like culture she enjoyed for 20 years. Learn why the VP of product management for infrastructure protection has a newfound focus.
Donnie MacColl, Senior Director of EMEA Technical Services at Fortra, discusses the recent updates to PCI DSS V4.0 and asks if the timeframe for implementation is fast enough to raise the level of cyber protection needed by financial institutions today?