Resources

Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
Blog

Evolving the Brand From HelpSystems to Fortra: Mike Devine

Over the past year, the chief marketing officer at Fortra has led the company’s effort to build upon its HelpSystems roots and redefine its role as a cybersecurity beacon for threat-weary security professionals. Learn about the monumental effort required to update the brand and why there’s a groundswell of excitement about what it means for the future.
Blog

From Receptionist to Senior Scrum Master: Dana Halvorson

Dana Halvorson supported grieving families as a funeral director before becoming a Fortra receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.
Blog

Cybersecurity Awareness Month 

October is Cybersecurity Awareness Month Our Cybersecurity Awareness Month Mad Libs for Good game has come to an end! Thanks to those who participated and helped raise funds for three great organizations advancing cybersecurity awareness and education: The Lone Star College Cybersecurity Scholarship Fund , Women Who Code , and TechSoup . No matter what piques your curiosity or speaks to your...
Blog

Alternative to UiPath: Fortra's Automate

As the RPA market has evolved three types of vendors have emerged based on increasing sophistication — and often — greatly increased costs. At one end you’ll find low-code or no-code automation products that offer desktop automation or productivity for individuals but can lack the functionality that would allow automation efforts to grow in number and complexity. At the opposite end, you’ll find...
Blog

Three Action Items to Consider After Completing a Pen Test

In order to complete a successful penetration test , a great deal of time is often spent in the planning stage. Time should also be invested into the post-test process. Going through the results of pen tests provides a great opportunity to discuss plans going forward and revisit your security posture overall. Seeing pen tests as a hoop to jump through and simply checking it off a list as “done”...
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
Blog

From Intern to Email Marketing Specialist: Paola R.

Paola’s Fortra journey started with an online internship posting. Today, the email marketing specialist loves using her native Spanish at work and remembers the pivotal project where everything clicked. What’s your favorite internship memory?
Blog

Cybersecurity Quiz: Security Solutions 101

Are you shopping for security solutions for your organization but aren't sure where to begin? Start by taking our cybersecurity quiz to test your knowledge.
Blog

What's It Like to Be in Marketing at Fortra?

The Fortra Marketing team is known for its commitment to producing great content with great people. Hear from some of our amazing marketing leads and specialists about their day-to-day and why they love what they do.
Blog

From Intern to Software Engineer I: Megan O.

As her software engineering internship wrapped up in 2021, Megan knew Fortra was where she wanted to be. Hear how she got connected with the company and why she’s passionate about the culture. Tell us about your internship experience!
Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?