Resources

Blog

The Email Security Gaps in Your Cloud

The cloud has reshaped the way organizations operate and comes with its own vulnerabilities in email security. Discover how Fortra's Cloud Email Protection can deliver multi-faceted defense against advanced email threats to keep your organization safe
Blog

Google and Yahoo Take Stance on Email Authentication

Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. Discover what these requirements mean for your organization, the importance of having Domain-based Message Authentication, Reporting & Conformance (DMARC) in place, and how Fortra can help.
Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your...
Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals...
Blog

Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy

Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe . Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog

What Is a Cloud Access Security Broker (CASB)?

The proliferation of cloud computing has heightened the need for organizations to monitor and manage the safe use of cloud services. Cloud access security brokers, or CASBs, provide the necessary security features to protect cloud-based resources as they’re accessed while also detecting threats and controlling data that flows through the cloud. What Are the 4 Pillars of Cloud Access Security...
Blog

Are Cybersecurity and Data Protection Now Integral to Business Success?

A famous front cover of The Economist in 2017 declared that the 'world’s most valuable resource is no longer oil, but data.' The value of data has indeed increased significantly. Organizations rely on data and data analytics for almost every facet of their operations and use it to make insightful decisions to help move the business forward. Many have invested in the tools and solutions - AI, CRM...
Blog

Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method

Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Press Release

Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To Fortra's Latest Agari And PhishLabs Report

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.
Blog

What is SIEM? How It Works, Best Practices for Implementation & More

Learn about Security Information and Event Management or SIEM, how an organization can get the most out of its SIEM technology and best practices for implementing a solution in this blog. SIEM, or Security Information and Event Management, is a type of software solution that provides threat detection, real-time security analytics, and incident response to organizations. It’s a popular IT security...