Writing in Dark Reading, John LaCour, CTO of PhishLabs by Fortra, looks at what financial institutions need to do to protect their cryptocurrency systems.
SAN ANTONIO, September 29, 2020 – GlobalSCAPE, Inc., a Fortra Company, was named the winner of a Gold Stevie® Award in the Software Defined Infrastructure category in recognition of its Enhanced File Transfer Platform, EFT 2020, in the 17th Annual International Business Awards®.
HelpSystems, LLC today announced they have acquired GlobalSCAPE. The combined company will focus on providing the most comprehensive collection of trusted security and automation solutions to customers worldwide.
GlobalSCAPE (NYSE American: GSB) and Fortra, LLC today jointly announced they have signed a definitive merger agreement. The combined company would focus on providing the most comprehensive collection of trusted security and automation solutions to customers worldwide.
Fortra announced today it has acquired the Core Security assets from SecureAuth. The assets acquired from SecureAuth are industry-leading solutions for identity governance and administration, penetration testing, threat detection, and vulnerability management.
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...