In his January contribution to Forbes Advisor, John Wilson discusses smartphone scams and shares 8 steps individuals and organizations can take to protect themselves.
What’s in store for the IBM i community in 2023? Find out in part 2 of IT Jungle’s prediction series featuring Fortra’s Robin Tatam and Amneris Teruel.
In this SecurityInfoWatch.com article, Wade Barisoff discusses Cybersecurity Maturity Model Certification (CMMC) standards and how organizations can comply with them.
In this Channel Futures guest blog, Renee Ritter looks at how businesses can recalibrate their approach to security and optimize process in order to move forward.
In this Digitalisation World article, Chris Bailey discusses Secure File Transfer solutions and how Digitial Rights Management (DRM) plays a key role in protecting an organization’s sensitive data even after it has been transferred.
In this Cybersecurity Magazine article, Alyn Hockey breaks down steganography and provides direction for organizations who want to keep their images safe and clear of hidden data.
In this Cybersecurity Insiders article, Tyler Reguly discusses PCI (Payment Card Industry) DSS and how the five-step transition checklist can help organizations ensure that they are addressing security changes to prevent audit fines and data breaches.
In this Evolving Enterprise article, Chris Spargen discusses the increase in digital supply chain attacks and details how organizations can minimize these risks.
In this Cyber Protection Magazine article, Chris Bailey, Senior Product Manager at Fortra, explores Digital Rights Management (DRM) and how it can stop unwanted parties from accessing sensitive data after it’s been shared.
In this teiss article, Kevin Cryan, Director of Operational Intelligence at Fortra's PhishLabs, discusses Google Ad service redirects and how they are being targeted in phishing attacks.
In an exclusive for Solutions Review’s Premium Content Series, Rohit Dhamankar from Fortra’s Alert Logic warns of a growing Cyber Cold War as countries stockpile vulnerabilities.
In this Security Boulevard article, Nick Hogg discusses how important Data Loss Prevention (DLP) and compliance policies are to an organization’s digital transformation process.
In this Professional Security Magazine article, Mieng Lim discusses ransomware and the ways organizations can proactively protect themselves against attackers.