Resources

Live Event
Come see Fortra at booth #33 at NAViGATE Toronto 2024 from November fourth to the sixth.
Live Webinar
Join IBM i expert Chuck Losinski on November 20th to learn how to solve the mystery of where your disk space is going and how to make cleanup a breeze.
Blog

BEC Global Insights Report: September 2024

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Blog

BEC Global Insights Report: August 2024

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
Product Video

Security Awareness Training Videos

Watch a sampling of Terranova Security's cyber security training video lessons. Experience the industry’s highest-quality security awareness training content.
Guide

The Cyber Security Hub

Access free security awareness training content on a variety of important topics, including phishing, social engineering, ransomware, passwords, and much more.
Datasheet

Fortra’s Email Security Bundles Datasheet

Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
On-Demand Webinar

IBM i in 2024: From AS400 to AI

Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
On-Demand Webinar

IBM i Performance Week

Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!
News Article

Investopedia: How to Report Identity Theft

What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.