Resources

Blog

Using Reviews to Choose RPA Software

Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog

Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Blog

Introduction to Advanced Web UI Automation

Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog

RPA Implementation Guide

Robotic process automation (RPA) implementation is about more than just finding a software tool. RPA can transform your business by simplifying the tedious, repetitive processes holding you back, but to do so, you need a proper RPA implementation strategy.Companies want to embrace the transformative technology but struggle with where to start, what processes to automate, and how to measure the...
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

How to Automate Login to a Website and Download a File

If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
Blog

Automated Integration: The Fuel for Your Digital Transformation

As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration, you could end up with a tangled mess of siloed applications and systems. And while automation and application integration may seem like...
Blog

What to Look for in Web Scraping Tools

The internet provides all the information you could ever want, right at your fingertips. While it’s made accessing information—like market research, stock information, and content aggregation to name just a few—much easier, manually grabbing data from websites can still be a daunting, time-consuming task. By investing in web scraping software web scraping software, you can streamline workflows...
Blog

The Email Security Gaps in Your Cloud

The cloud has reshaped the way organizations operate and comes with its own vulnerabilities in email security. Discover how Fortra's Cloud Email Protection can deliver multi-faceted defense against advanced email threats to keep your organization safe
Blog

Google and Yahoo Take Stance on Email Authentication

Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. Discover what these requirements mean for your organization, the importance of having Domain-based Message Authentication, Reporting & Conformance (DMARC) in place, and how Fortra can help. ...
Blog

How to Recover After Failing a Cybersecurity Audit

While it’s important to adhere to compliance regulations, blunders do happen. What does it mean when these blunders lead to you failing a cybersecurity audit, and how can you recover? Consequences of Failing a Cybersecurity Audit Failing a cybersecurity audit can mean several things. First, there’s the up-front legal fines that come with falling on the wrong side of compliance. Here are a few...
Blog

How to Scrape Data from a Website (Tutorial)

Spending too much time going to websites and manually entering data into spreadsheets? While they may seem simple, these types of tasks eat up a great deal of time, and with manual data entry, are incredibly error prone. But with a web scraping tool, you can scrape data from a website, saving your team time and reducing errors. And with the right tool, you won’t need to write a single line of code...
Blog

RPA vs. API: Differences and Use Cases

At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.