News Article
The Last Watchdog: Will the U.S. Senate Vote to Ban TikTok?
By Antonio Sanchez on Fri, 03/29/2024
The U.S. House of Representatives passed a bill that would ban TikTok unless its China-based parent company relinquishes its stake. Antonio Sanchez spoke with The Last Watchdog and shared his observations.
Blog
Automated Integration: The Fuel for Your Digital Transformation
Fri, 03/22/2024
As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration, you could end up with a tangled mess of siloed applications and systems. And while automation and application integration may seem like...
News Article
Diginomica: US Executive Order Promises Privacy Progress
By Wade Barisoff on Fri, 03/22/2024
The recent US Executive Order promises progress in privacy protection. In this Diginomica article, Wade Barisoff shares his observations and discusses how this EO can help protect sensitive personal data.
News Article
Dark Reading: Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
By Tyler Reguly on Fri, 03/15/2024
Tyler Reguly spoke with Dark Reading about Microsoft’s Patch Tuesday security update for March.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
News Article
PYMNTS: FBI Sounds Alarm on AI-Driven Infrastructure Hacking
By Antonio Sanchez on Thu, 03/14/2024
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
On-Demand Webinar
[WEBINAR] The Platform Paradigm
Session DetailsSecurity technology adoption is going through a paradigm shift. The wide range of nonintegrated products from a variety of vendors simply are not providing the outcomes security teams expect from their investments. Enter: Fortra, a cloud-native, multi-vector cyber defense platform that changes the game, combining best-of-breed solutions into a unified security experience. What gives...
News Article
IT Nerd: Tips to Safeguard Against Tax Vishing Scams
By John Wilson on Fri, 03/01/2024
Tax-related phishing and vishing scams are rising during tax season. John Wilson shares valuable tips on how to spot those scams and stay safe.
Demo
Want to see what's new in Automate 24.2?
Watch an on-demand demo of the latest Automate release now! Get instant access to an on-demand demo showcasing the latest and greatest features in Automate. Automate 24.2 is here! What you'll see in our latest version:Agent NotificationsDynamic 365 ActionEvaluateExpression(Expression) Extended FunctionWeb Browser Action EnhancementAnd more! ...
News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Blog
The State of Cybersecurity in Healthcare
By Antonio Sanchez on Tue, 02/20/2024
Healthcare is one of the most targeted industries for cyberattacks today. Find out what makes it so vulnerable and how Fortra’s portfolio of solutions come together to provide layered defense for the industry.
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Blog
Vendor Consolidation: Why the IT Mindset Has Shifted, and How We Got Here
By Antonio Sanchez on Thu, 02/15/2024
Today’s security status quo isn’t working, and companies are plagued with overlapping vendors. Find out why quality beats quantity when it comes to making your vendor selections.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.