News Article
Help Net Security: Exploring the Impact of Generative AI in the Presidential Election
Mon, 12/25/2023
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
Article
How GoAnywhere MFT Can Support You During COVID-19
By Brian Pick on Fri, 06/05/2020
Due to COVID-19, workforces are now more remote than ever. Unfortunately, this means sensitive data is likely not as safe as it should be. Secure MFT solutions are a proactive practice to implement.
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool!
In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
Guide
6 Users to Put on Your Security Watch List
Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about.
Sometimes, security threats come from the inside.
In this ebook, you'll learn about eight user types we think you should put on...
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.