In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Cybersecurity is no longer a one-dimensional, defensive only mind-set. Attacks have become multi-pronged and organizational security solutions also need to act offensively. Proactive, layered offensive security should include multiple security solutions, including penetration testing, to uncover security risks before they’re exploited.
Fortra’s Core Impact enables security teams to go on the...
In his January contribution to Forbes Advisor, John Wilson discusses smartphone scams and shares 8 steps individuals and organizations can take to protect themselves.
What’s in store for the IBM i community in 2023? Find out in part 2 of IT Jungle’s prediction series featuring Fortra’s Robin Tatam and Amneris Teruel.
In this SecurityInfoWatch.com article, Wade Barisoff discusses Cybersecurity Maturity Model Certification (CMMC) standards and how organizations can comply with them.
In this Channel Futures guest blog, Renee Ritter looks at how businesses can recalibrate their approach to security and optimize process in order to move forward.
In this Digitalisation World article, Chris Bailey discusses Secure File Transfer solutions and how Digitial Rights Management (DRM) plays a key role in protecting an organization’s sensitive data even after it has been transferred.
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions.
Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
In this Cybersecurity Magazine article, Alyn Hockey breaks down steganography and provides direction for organizations who want to keep their images safe and clear of hidden data.