Resources

Live Webinar
Fortra takes being your cybersecurity ally seriously. That’s why we’ve been challenging the security status quo in 2024, and we’ve got the tangible results to prove it. We’re leaving our mark on the market with new extended detection and response capabilities, enhanced threat intelligence, BEC research, responsive development, strategic partnerships, and more! On July 17,...
Blog

Understanding The White House’s 2024 Cybersecurity Report

To protect against mounting threats to national security via nation-state cyberattacks, domestic ransomware attacks, and threats to critical infrastructure, The White House issued its 2023 National Cybersecurity Strategy. This recently released 2024 report reviews progress made towards achieving those outlined objectives.
Live Webinar
Join our live webinar on June 18th to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
Live Webinar
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can...
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.