Tripwire ExpertOps
The Industry’s Best FIM, SCM, and VM as a Managed Service
Tripwire® ExpertOps provides file integrity monitoring (FIM), security configuration management (SCM), and vulnerability management (VM) as a managed service to arm you with the solution operation, support, and advice you need to stay compliant and reduce your attack surface.
...
Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and Compliance
With decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
...
News Article
Security Weekly: Email Impersonation Threats Reaching Corporate Inboxes Hit An All-Time High
By John Wilson on Mon, 08/21/2023
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
On-Demand Webinar
Repository Mode: Sequel’s Hidden Gem
Watch our webinar on Sequel's second interface: Repository Mode. Learn how Repository Mode makes saving your Sequel objects easier with security management, Active Directory authentication, and IFS integration.
News Article
ABC11 EyewitnessNews: FBI Warns of Teens Being Targeted in Sextortion Scams
By John Wilson on Tue, 08/01/2023
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
News Article
Cybersecurity Insiders: The Looming Threat of Business Email Compromise
By John Wilson on Thu, 07/20/2023
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
News Article
SC Media: Malicious Emails Pelting Inboxes Hit All-time High in Q1, 2023
Tue, 07/18/2023
According to the latest research by Fortra’s PhishLabs, in Q1 2023, about a quarter of emails landing in inboxes were classified as “do not engage” or malicious. SC Media shared key insights from the report.
News Article
The Last Watchdog: Fortra Researchers Find Email Impersonation Attacks Climbing to an All-Time High
By John Wilson on Mon, 07/17/2023
John Wilson spoke to The Last Watchdog and discussed the key findings of Fortra’s recent research on business email compromise (BEC).
Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals,...
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...
Fortra Cybersecurity Software Bundles
Learn how Fortra software bundles feature powerful product combinations that solve complex cybersecurity challenges in innovative ways.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Guide
PCI DSS 4.0 Compliance: Tips to Avoid Last-Minute Panic
The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy.
This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated requirements. Having a...
On-Demand Webinar
Overcome BI Obstacles with Sequel's Viewpoint Scripts
Viewpoint Scripts are one of the most versatile tools in your Sequel toolbox. Watch as business intelligence expert Brandy Lulling demonstrates how and when to use them.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
TechTarget: Vishing Attacks Increasing, But AI's Role Still Unclear
Eric George spoke to TechTarget and elaborated on whether AI technology contributes to increased vishing attacks.