In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
Each year the threat landscape continues to evolve, and security measures must evolve with it. Recently released, Fortra’s 2023 Penetration Testing Report offers a view into the usage and perception of pen testing, with the intent to determine how these services must adapt in the future. Explore a few salient points in this edition that betrayed changes in the penetration testing landscape.
Last year, Renee and her team introduced a new partner program and led partners through the rebrand to Fortra. Here's her take on these achievements and a look at the strategic shifts that will be required for cybersecurity moving forward.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
There’s a lot of talk about ChatGPT. While there are many positive and interesting applications, cybersecurity experts are worried about how threat actors will employ this tech. Learn about two potential use cases and how organizations can prepare.
In a recent penetration test, the Fortra team was able to harvest enough credentials from a customer to know a savvy threat actor could take down their domain. Discover why testing your organization’s defenses is essential to offensive security.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Cobalt Strike and Outflank Security Tooling (OST) are two elite red teaming solutions ideal for assessing the security posture of an organization by deploying sophisticated adversary simulations.
Cobalt Strike is a threat emulation tool that provides a post-exploitation agent and covert channels, replicating the tactics and techniques of an advanced adversary in a network. OST is a curated set...
Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) are three powerful security solutions that use the same techniques as today’s threat actors in order to safely evaluate organizational infrastructures and provide guidance on closing security gaps, enhancing defenses, and creating more resilient security strategies.
Core Impact is an automated penetration testing tool, typically...
Hyperautomation has quickly emerged as a hot topic in the automation space. And research firm Gartner agrees—identifying it as one of the top 10 strategic technology trends. But is it worthwhile to add to your digital transformation strategy or a flash in the pan?
Join Fortra’s automation experts for a panel discussion on hyperautomation and how it’s more than just a trend—it’s a discipline. In...