Press Release
Fortra Advances Cybersecurity Defense with Expanded Threat Intelligence Capabilities
Fortra recently enhanced its Threat Intelligence offerings, adding high-fidelity threat intelligence with timely, curated data to level the playing field and provide cybersecurity analysts the edge needed to stay a step ahead of modern threat actors.
Live Event
Our Strengthen Your Defenses: Globalscape’s Best Practices customer webinar on May 23rd will zero in on Globalscape’s System Architecture and Best Practices guides, which detail the best practices and configurations to help you further strengthen the security of your Globalscape environment. Fortra Solutions Engineers, Richard Foresyth and Jacob Bernal, will cover: Updates to the most recent...
Live Webinar
Join this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Live Webinar
May
14
Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Guide
2024 Pen Testing Report
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation...
News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
News Article
Cyber Defense Radio: Data Privacy on Social Media
By Antonio Sanchez on Wed, 04/17/2024
Antonio Sanchez spoke to Cyber Defense Radio about mitigating the risks of data leaks and protecting personal information in the age of social media.
Live Webinar
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Datasheet
Powertech RSA SecurID Agent for IBM i
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
Blog
Patch Tuesday Update April 2024
By Tyler Reguly on Thu, 04/11/2024
The first thing that anyone looking at the Microsoft security guidance this month will notice is the inclusion of Common Weakness Enumeration (CWE) information.
Live Webinar
Join this live webinar on June 6th to learn more about AI and other document and forms management trends and how you can get started implementing them.
Live Webinar
Your organization’s data is its most valuable asset. Retaining data properly helps ensure you meet industry compliance requirements and keep the trust of your customers or trading partners. Whatever your organization’s specific data retention policies may be, you’ll need to ensure that your data is secured at rest as well as in motion, with robust auditing and reporting of all file movements.
News Article
Information Week: 10 Ways to Boost Cybersecurity Talent Retention
By John Grancarich on Wed, 04/10/2024
How can organizations create a work environment to retain cybersecurity talent? John Grancarich shares insights on keeping employees engaged and decreasing turnover rates.
Blog
Anti-Phishing Lessons Learned from Fortra’s Gone Phishing Tournament
By Antonio Sanchez on Mon, 04/08/2024
It is the largest phishing simulation in the world: Fortra’s Terranova Security’s yearly Gone Phishing Tournament (GPT) tests over 1.37 million end users across 142 countries and 31 languages. The results don’t lie – but this year they may be surprising.
Blog
Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting
Mon, 04/08/2024
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Press Release
Fortra Recognized as Market Leader for Email Security
Fortra announced today their recognition as a “Top Player” in The Radicati Group’s Secure Email Market Quadrant, 2024. The Radicati Group’s analysis found that Fortra provides both breadth and depth of functionality while shaping the market with innovative technology and a compelling strategic vision.
Live Webinar
Session Details **This session meets at multiple times.** Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. On May 8, Fortra CISO Chris...