In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
John Wilson, Agari by Fortra, features throughout this CSO Online article looking at why people still fall for simple social engineering scams. Find out what “old tricks” still work and what’s new trends are emerging.
Find out how Agari’s brand protection product help organizations secure their email and why the current stress on the world’s global supply chain makes them more vulnerable to cyber-attacks.
In this Information Age article, Ravi Dirckze, Technical Product Manager at Fortra, explains the need for businesses to understand their automation journey.
How important is a zero-trust approach to ensuring effective cybersecurity in the work-from-anywhere era? Steph Charbonneau answers the editor’s question in Intelligent CISO.
In Authority Magazine, Tyler Gallagher interviews John Wilson of Agari by Fortra to find out how companies can optimize their approach to data privacy and security.
For the second consecutive year, Fortra ranked first in multiple categories, including usability and intuitiveness, ease of implementation, and quality of features.
Consumer privacy legislation is a critical foundation in protecting the rights of consumers and ensuring their safety and privacy online. Many countries around the world have already adopted comprehensive legal protections for personal data.
Based in the Netherlands, ALD Automotive is a global player in mobility financing and management and active in 43 countries. They strive to offer every company the right mobility mix, to make the day-to-day work of fleet- and mobility managers easier, and to take work out of the hands of the lease driver.
...
Fortra announced today the opening of its Automation Connector Hub, a marketplace for customers to streamline business processes and integrate key applications with your Fortra software.
Adam Strange illustrates the pitfalls of information security architecture and explains how shifting to data-centric strategies will protect data at file level throughout its entire life cycle.
Data Classification solutions help companies understand and manage their data, however, in this era of regulatory obligation, a "one-size-fits-all" solution doesn’t provide the granularity or flexibility needed to remain compliant.