Writing in Dark Reading, John LaCour, CTO of PhishLabs by Fortra, looks at what financial institutions need to do to protect their cryptocurrency systems.
In Unite.AI’s cybersecurity interview, Mieng Lim, VP Product Management at Digital Defense by Fortra, talks about her career at Digital Defense and explains why vulnerability management is fundamental for today’s connected organization.
Part 2 of the Improving Your Security-Efficiency Balance Series:
One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user access. In this blog...
One of the latest data security breach examples is EasyJet, which revealed that nine million customers’ personal data was compromised. Learn more about data breaches in the age of COVID-19, and what steps you can take to protect your organization.
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.