Resources

Live Event
Operational Technologies (OT) are central to almost every facet of our lives: CT machines, industrial robots, CNC milling machines and even washing machines. It encompasses anything that includes a computer chip and a program inside that is not traditionally “owned” by IT.However, operational technologies may use obsolete software that is vulnerable to threats because they have...
Live Event
Operational Technologies (OT) are central to almost every facet of our lives: CT machines, industrial robots, CNC milling machines and even washing machines. It encompasses anything that includes a computer chip and a program inside that is not traditionally “owned” by IT.However, operational technologies may use obsolete software that is vulnerable to threats because they have...
Live Event
The Center for Internet Security (CIS) Critical Security Controls (CSC) are a trusted source of truth in the cybersecurity community. Many organizations implement the CIS CSC framework to ensure their cybersecurity programs are functioning at peak effectiveness. The latest iteration, CIS CSC v8.1, was released earlier this year. Join Matthew Jerzewski, Cybersecurity Researcher...
Live Webinar
Join GoAnywhere’s leadership team for a packed hour covering:Preview of GoAnywhere 2025 releasesWhat’s new in GoAnywhere from the second half of this yearA look at Fortra Threat Brain (a multi-vector hub of verified threat intelligence)Answers to your most common GoAnywhere questions ...
Live Webinar
The popularity of cloud-based file sharing services such as AWS, Dropbox, and OneDrive is undeniable. However, these user-friendly solutions come with some critical security drawbacks.Join Scott Messick, Lead Solutions Engineer, Fortra Dec. 12, as he discusses the pros and cons of cloud file sharing and introduce the advantages secure, managed file transfer (MFT) offers for...
Live Event
Join us as we proudly sponsor the VMUG UserCon on November 13th! Swing by for a chat about MFT and see how we can help with your IT problems. Haven’t secured your spot yet? It’s free! ...
Live Event
In many ways, 2024 has been a landmark year for cybersecurity. At Fortra, our cybersecurity experts have no shortage of opinions on where we’ll go next. From cyber insurers raising the bar with their own compliance requirements to shifting market dynamics, the events of 2024 will have significant consequences for the shape of the industry in the months ahead. Tune in as a...
On-Demand Webinar

[WEBINAR] Bearing the Load: Managing Supply Chain Risk

Session DetailsThe risk you carry as an enterprise is no longer entirely in your control. Or is it?Join Fortra as we discuss one of the hottest topics in cybersecurity today: third-party risk. Partnering with outside organizations can be an instant liability, but in today’s vastly interconnected business economy, it's a necessary evil. Lengthened supply chains facilitate faster and cheaper...
Blog

BEC Global Insights Report: September 2024

The monthly Global BEC Insights Report from Fortra presents a comprehensive analysis of the latest tactics, techniques, and procedures (TTP) employed by BEC threat actors. This report draws on extensive intelligence gathered from hundreds of active defense engagements conducted throughout the month. Key insights include geolocation data, attack volume, and the variety of scams, such as payroll diversion and advance fee fraud. The report also highlights the use of gift cards in scams, the requested amounts in wire transfer fraud, and the banks and webmail providers frequently targeted by attackers. These findings provide a critical understanding of the evolving BEC threat landscape.
News Article

CyberTech Insights: The Cybersecurity Gap: Why Even the Best-Trained Teams Still Vulnerable to Attacks

In a new article for CyberTech Insights, John Grancarich, Fortra's Chief Strategy Officer, explores why security awareness training matters more than ever. Drawing from personal experiences with cyber extortion and phishing, John highlights how continuous practice can better prepare us for real-world risks.Originally published in CyberTech Insights.Excerpt:“We’re not going to get any less busy, so...