Being a cybersecurity professional means you’re regularly in charge of making complex decisions with real-world consequences, like choosing the right cybersecurity benchmarks, controls, frameworks, or best practices for your organization. Should you apply the CIS Controls, the NIST Cybersecurity Framework, or something else? Without overarching industry consensus, it can be...
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your...
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation. ...
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Learn key strategies and elements for effective cloud security in this Alert Logic webinar with Nicholas Laing, Solutions Engineer at Fortra. In this webinar, we cover:
Challenges of cloud security
Drivers for cloud adoption
Critical questions for cloud strategy
Cloud adoption phases
Security considerations
Architectural approaches
Security responsibilities and cloud frameworks
Key cloud...
The cloud has reshaped the way organizations operate and comes with its own vulnerabilities in email security. Discover how Fortra's Cloud Email Protection can deliver multi-faceted defense against advanced email threats to keep your organization safe
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.