Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Learn key strategies and elements for effective cloud security in this Alert Logic webinar with Nicholas Laing, Solutions Engineer at Fortra. In this webinar, we cover:
Challenges of cloud security
Drivers for cloud adoption
Critical questions for cloud strategy
Cloud adoption phases
Security considerations
Architectural approaches
Security responsibilities and cloud frameworks
Key cloud...
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
Fortra’s Alert Logic Managed Detection and Response and Digital Guardian Data Loss Prevention have been recognized in Expert Insights’ “Top Solution” awards for Q4 2023.
What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.