Sending confidential information with basic encryption is no longer enough. In this SecurityInfoWatch.com article by Chris Bailey, Sr Product Manager at Fortra, find out why Digital Rights Management (DRM) is needed for true Zero Trust.
In his October contribution to Forbes Advisor, John Wilson explains what social engineering is and gives examples of scams involving (phony) third parties.
Every ad links to Google’s Ad Service and then it redirects you to your destination – to leverage this the threat actors would set up their own redirect sites and buy ads to point to them.
In this Cyber Protection Magazine article highlighting Cybersecurity Awareness Month, Chris Spargen expresses how being an early adopter of the latest security updates will lead to a more secure organization.
In this Beta News article, John Grancarich encourages patience while navigating Zero Trust and gives 7 key considerations for adopting a Zero Trust architecture.
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. Fortra's experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.
In this ITPro Today case study, find out why Summit Credit Union adopted robotic process automation (RPA) technology to streamline and improve an outdated online loan application process.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his guest essay for The Last Watchdog, Eric George, Director of Solutions Engineering at PhishLabs by Fortra, explains what ransomware is, who the high-stake threat actors are, and how organizations can defend themselves against ransomware attacks.
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
Hybrid vishing (email-initiated voice phishing) attacks are on the rise. In this ZDNet article, John Wilson discusses the findings from the latest Agari and PhishLabs research and explains what organizations can do to help prevent hybrid vishing attacks.
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
In this video, Stuart Sumner, Editorial Director of Computing and Donnie MacColl, Senior Director of Technical Services at Fortra, explore the trends surrounding the current state of automation and discuss how to create a successful implementation strategy for fast ROI.
In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at Fortra, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.
With so much information published on Zero Trust, it’s easy to see why organizations remain unsure about what it means, let alone move forward with adopting a framework. In this Help Net Security video, John Grancarich cuts through all the material and aligns it with the process recommended by NIST to create a Zero Trust Playbook.