Blog
Source Authentication for Email
Mon, 07/04/2022
This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
On-Demand Webinar
How to Keep Sensitive Data Safe and Compliant
By Nick Hogg
Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...
Blog
Cybersecurity Made Easy: Alert Logic Brings Comprehensive MDR Coverage to Fortra
Thu, 06/16/2022
The unrivaled security experts add their white-glove, managed detection and response approach to a robust suite of solutions. Onkar Birk explains why this is a very good thing.
Video
CISO Perspectives Data Security 2022 - Interview with Cary Hudgins
Mon, 06/06/2022
Watch Cary Hudgins, Vice President of Product at PhishLabs, speak with iSMG's Tom Field to discuss the results of Fortra's recent CISO Perspectives: Data Security Survey.
Blog
Emerging Privacy Regulations in the United States
Fri, 06/03/2022
Take a deeper dive into which states are enforcing privacy regulations currently, or in the near future, and what you can do to make sure your organization is compliant.
Blog
Building Cybersecurity Resilience in Financial Services
Wed, 05/25/2022
Learn how financial services CISOs can maintain cybersecurity resilience in a complex, highly regulated environment with sophisticated threats.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
Blog
Missed CYBERUK 2022? Highlights from NCSC’s Main Event
By David Zacharias on Fri, 05/20/2022
Fortra VP of Global IT, David Zacharias looks at some of the takeaways including the threat of ransomware, supply chain security, and more.
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Thu, 05/19/2022
Digital Rights Management tools can help give your organization the highest level of control and visibility possible over its data. Here are 4 ways to use it.
On-Demand Webinar
Panel Discussion: Email Security Trends and Your Protection Ecosystem
Watch this webinar to hear about the latest email scams and how they can impact your protection ecosystem.
Video
Securing Cyberattack Vulnerabilities from Your Vendors
Email threats lurk everywhere, including those from trusted outside partners. Discover how organizations can identify supply chain vulnerabilities and where Fortra can mitigate risks while allowing legitimate communication to continue.
Guide
CISO Perspectives: Data Security Survey
The COVID-19 pandemic permanently changed cybersecurity, from cloud migration to remote work to security at the edge, and at the same time, threats have increased. Fortra partnered with ISMG to better understand COVID’s impact on data security, how leaders feel about their progress, and what their current practices and priorities are.
Blog
Developing Global Cybersecurity Solutions at Scale: Matt Bresnan
Fri, 04/29/2022
Matt Bresnan shares the keys to developing successful products and the top change he’d like to see in the cybersecurity industry.
Blog
Top 6 Data Security Risks that Can Impact Your Bottom Line
Mon, 04/25/2022
Data security risks are only increasing in the ever-growing cyber threat landscape, but these six can do the most damage to your bottom line.
Blog
Solutions for Vulnerability Management
Fri, 04/22/2022
This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Video
Learn What's New in Email Security at Fortra
By Alyn Hockey
This video will showcase Agari and Clearswift feature updates, new threat report findings, and how new Fortra Email Security tools create a more robust email security solution.