After Fortra acquired Digital Defense, Mieng Lim embraced remote work and the continuation of the family-like culture she enjoyed for 20 years. Learn why the VP of product management for infrastructure protection has a newfound focus.
In order to complete a successful penetration test, a great deal of time is often spent in the planning stage. Time should also be invested into the post-test process. Going through the results of pen tests provides a great opportunity to discuss plans going forward and revisit your security posture overall. Seeing pen tests as a hoop to jump through and simply checking it off a list as “done” won...
Watch now for an informative webinar where Document Management expert Greg Schmidt discusses iForms' value as a modern alternative to AFP and walks you through how to use iForms to create a variety of business critical documents.
Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
Donnie MacColl, Senior Director of EMEA Technical Services at Fortra, discusses the recent updates to PCI DSS V4.0 and asks if the timeframe for implementation is fast enough to raise the level of cyber protection needed by financial institutions today?
The Build-A-Bot Workshop is designed to fast track your company's automation initiatives. This workshop is delivered in three segments to maximize the knowledge transfer of what RPA can do, how to prioritize process candidates, and get started with bots. The implementation activities are delivered on a pre-paid basis. Key Deliverables Quick, in-depth assessment of Automate Kickstart organizational...
Hybrid vishing (email-initiated voice phishing) attacks are on the rise. In this ZDNet article, John Wilson discusses the findings from the latest Agari and PhishLabs research and explains what organizations can do to help prevent hybrid vishing attacks.
Paola’s Fortra journey started with an online internship posting. Today, the email marketing specialist loves using her native Spanish at work and remembers the pivotal project where everything clicked. What’s your favorite internship memory?
During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done!
This session is a must for those eager to understand how the Fortra team of expert problem solvers is ready to find answers to your organization’s toughest problems, and how we remain committed to being a people-first company ready to collaborate with our customers.
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
There are two types of companies: those that run on data and those that will run on data. Infosec professionals will perennially be challenged with more to do than time, budget, and staffing will allow. The most effective method to address this is through prioritization, and in the case of your growing data, prioritization comes from data classification. In this guide you will learn what...