Preparing for the Impact of PCI DSS 4.0
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
Insider Threat Awareness Month: What You Need to Know
So much time, effort, and resources are spent defending the perimeter-less network from outside attacks that a key risk factor is often overlooked: the insider threat.
The Last Watchdog: The Drivers Behind Persistent Ransomware and Defensive Tactics to Deploy
In his guest essay for The Last Watchdog, Eric George, Director of Solutions Engineering at PhishLabs by Fortra, explains what ransomware is, who the high-stake threat actors are, and how organizations can defend themselves against ransomware attacks.
Out With AFP, in With iForms
By Greg J. Schmidt on Thu, 08/25/2022
Watch now for an informative webinar where Document Management expert Greg Schmidt discusses iForms' value as a modern alternative to AFP and walks you through how to use iForms to create a variety of business critical documents.
e-ChannelNews Interview with Mark Bell: Core Security Releases New Ransomware Simulator
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
Simple Ways to Tame Document Chaos
By Greg J. Schmidt on Thu, 07/28/2022
Modern organizations need critical documents to be readily accessible and secure. Watch this 30-minute webinar to learn how web-based document management systems can streamline document control and improve efficiency.
2022 Pen Testing Report
How effective are your existing security controls against a skilled threat actor? With cyber attacks now a common place occurrence, organizations are regularly having to ask themselves this question, and often get the answer only after an attack occurs. Penetration tests are a safe way to proactively evaluate cybersecurity programs, uncovering and exploiting security threats to find out what level...
Your Money or Your Business: Beating the Business of Ransomware
Ransomware is big business. Attacks have evolved to become more complex, damaging and far reaching. In Teiss magazine, Mieng Lim, VP of Product Management, provides advice on how to protect against ransomware and prevent cybercriminals from penetrating an organization's defenses.
Building a Proactive Security Strategy
By Donnie MacColl on Sat, 05/21/2022
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation. Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
Brakeing Down Security Podcast with Mieng Lim: Ransomware Best Practices
Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
Content Intelligence: What Is It and Why Is It Important?
By Greg J. Schmidt on Fri, 02/18/2022
There are many different strategies a company can employ to help drive their organization to the next level. But why not use what you already have in your hands? Connect your content, documents, and information together to drive your business to the next level.
Ask an Expert: What’s Trending in Document and Forms Management?
By Greg J. Schmidt on Thu, 10/21/2021
Discover the latest trends in document and forms management and learn how to shape your strategy for organizational survival and growth in this conversation with technical expert Greg Schmidt.
I Have All Object Authority and I’m Not Afraid to Use It!
By Robin Tatam on Thu, 10/14/2021
In this webinar, security expert and IBM Champion Robin Tatam explores best practices for All Object authority and strategies for correcting this vulnerability.
What's Trending in Document and Forms Management?
By Greg J. Schmidt on Fri, 10/08/2021
Discover the latest trends that are rising to the top for document and forms management. Learn what’s in store for 2022—especially around digital transformation and automation. As these key themes become critical to organizational survival and growth, learn how they’re here to stay through 2022 and beyond.