News Article
ABC11 EyewitnessNews: FBI Warns of Teens Being Targeted in Sextortion Scams
By John Wilson on Tue, 08/01/2023
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
News Article
Cybersecurity Insiders: The Looming Threat of Business Email Compromise
By John Wilson on Thu, 07/20/2023
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
News Article
SC Media: Malicious Emails Pelting Inboxes Hit All-time High in Q1, 2023
Tue, 07/18/2023
According to the latest research by Fortra’s PhishLabs, in Q1 2023, about a quarter of emails landing in inboxes were classified as “do not engage” or malicious. SC Media shared key insights from the report.
News Article
The Last Watchdog: Fortra Researchers Find Email Impersonation Attacks Climbing to an All-Time High
By John Wilson on Mon, 07/17/2023
John Wilson spoke to The Last Watchdog and discussed the key findings of Fortra’s recent research on business email compromise (BEC).
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...
On-Demand Webinar
Overcome BI Obstacles with Sequel's Viewpoint Scripts
Viewpoint Scripts are one of the most versatile tools in your Sequel toolbox. Watch as business intelligence expert Brandy Lulling demonstrates how and when to use them.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
On-Demand Webinar
How to Make it Easier for Users to Leverage Business Data
Data access expert Greg Schmidt demonstrates how Sequel puts the power of your business data in the hands of your users using Excel integration, automated data delivery, and much more.
Datasheet
Red Team Bundle
Cobalt Strike and Outflank Security Tooling (OST) are two elite red teaming solutions ideal for assessing the security posture of an organization by deploying sophisticated adversary simulations.
Cobalt Strike is a threat emulation tool that provides a post-exploitation agent and covert channels, replicating the tactics and techniques of an advanced adversary in a network. OST is a curated set...
Datasheet
Advanced Red Team Bundle
Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) are three powerful security solutions that use the same techniques as today’s threat actors in order to safely evaluate organizational infrastructures and provide guidance on closing security gaps, enhancing defenses, and creating more resilient security strategies.
Core Impact is an automated penetration testing tool, typically...
On-Demand Webinar
Best Practices for Optimizing Sequel Viewpoint
Join Sequel Support Manager Sheryl Quinlan as she breaks down Sequel Viewpoint’s key components, how and when to use them, and other best practices for maximizing your Sequel experience.
Datasheet
OST - Outflank Security Tooling Datasheet
OST is a curated set of offensive security tools created by expert red teamers. Ideal for advanced security teams testing even mature and sensitive target environments, this toolkit covers every significant step in the attacker kill chain, from difficult stages such as initial access to final exfiltration.
Prioritizing Stealth and Evasion
One of the key challenges that red teams face today is...
Datasheet
Fortra Advanced Email Security Solutions
Since keeping the bad at bay is the rallying cry of the day, enterprises need comprehensive protection that spans the entire lifecycle of threats from the staging of email-borne threats outside your organization to active threats landing in the inbox. Fortra’s Advanced Email Security solutions do just this—whether you are operating in the cloud, in a hybrid environment, or on-prem through a complete solution, we can help you solve your toughest email security challenges.
On-Demand Webinar
By Invitation Only: A Customer Exclusive Briefing
Join our IBM i experts as they discuss Fortra's new identity and IBM i product developments to look forward to.
On-Demand Webinar
Make Quicker, Better-Informed Business Decisions
Watch this webinar to learn more about the limitations of Query/400 and how modernized BI remedies them.
Article
Top Three Reasons Mobile Data Access Will Be Your Savior
Tue, 11/22/2022
In today’s business world, you need data access beyond the green screen and GUI. Read this article to learn how mobile data access in a friendly browser interface will save you.
On-Demand Webinar
Ask the Sequel Experts: Part III
Watch this webinar to get insights from our experts on anything and everything Sequel and your business intelligence needs.