Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals,...
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
News Article
Forbes Advisor: Beware Of These Vacation Rental Scams That Con Guests And Hosts
In his May contribution to Forbes Advisor, John Wilson sheds light on vacation rental scams targeting guests and hosts.
News Article
Technology Record: Theo Zafirakos on Using Simulation for Cybersecurity
Improving user behavior and implementing interactive education can lower the risk of cyberattacks and help foster a security-conscious organizational culture.
Press Release
Fortra’s Alert Logic Wins Fortress Cybersecurity Award for Threat Detection
Fortra's Alert Logic Managed Detection and Response (MDR) has won a 2023 Fortress Cybersecurity Award for threat detection services. Fortra’s Terranova Security was recognized as a finalist in the category for security awareness training.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
On-Demand Webinar
The Foundation of IBM i Security Defense
By Sandi Moore
At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
Blog
Four RSA Conference 2023 Takeaways from an Industry Veteran
Thu, 05/18/2023
I’ve attended RSA Conference for years. The event is always special, but this year was momentous because it was our first time exhibiting as Fortra.
Guide
PCI DSS 4.0 Compliance: Tips to Avoid Last-Minute Panic
The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy.
This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated requirements. Having a...
Guide
Understanding the White House’s 2023 National Cybersecurity Strategy
The Biden Administration’s bold 2023 National Cybersecurity Strategy forms a roadmap for public and private security efforts. There’s a lot of valuable content in this plan, which will take organizations time to understand and apply to their operations. Fast-track your knowledge with this eBook, which distills the five critical pillars and their ramifications.
Discover how to:
Protect...
Blog
Key Insights for Zero Trust in 2023
By Antonio Sanchez on Mon, 05/08/2023
With the release of the 2023 Zero Trust Security Report, it’s a good time to reflect on the seismic shifts that have happened in the industry regarding network security. Discover key insights and impacts of Zero Trust in 2023.
News Article
Forbes Advisor: Pig-Butchering Scams
In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
Blog
Security Awareness: The Groundwork of Cybersecurity Culture
Wed, 05/03/2023
It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not.
Criminal hackers go after the...
News Article
CyberRisk Alliance Podcast with John Grancarich at RSA 2023
John Grancarich, EVP Strategy, features on the CyberRisk Alliance Podcast at RSA, with host Matt Alderman.
Blog
Exploring the 2023 Penetration Testing Report: 5 Key Findings
Mon, 04/17/2023
Each year the threat landscape continues to evolve, and security measures must evolve with it. Recently released, Fortra’s 2023 Penetration Testing Report offers a view into the usage and perception of pen testing, with the intent to determine how these services must adapt in the future. Explore a few salient points in this edition that betrayed changes in the penetration testing landscape.
On-Demand Webinar
Expert Advice on IBM i in the Cloud
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Blog
Creating a World of Possibility for Fortra's Global Partners: Renee Ritter
Thu, 04/13/2023
Last year, Renee and her team introduced a new partner program and led partners through the rebrand to Fortra. Here's her take on these achievements and a look at the strategic shifts that will be required for cybersecurity moving forward.
News Article
Bloomberg Tax: Tax Pros and Their Clients Can Be Targets of ‘Vishing’ Scams
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.