Sending confidential information with basic encryption is no longer enough. In this SecurityInfoWatch.com article by Chris Bailey, Sr Product Manager at Fortra, find out why Digital Rights Management (DRM) is needed for true Zero Trust.
In his October contribution to Forbes Advisor, John Wilson explains what social engineering is and gives examples of scams involving (phony) third parties.
In this Cyber Protection Magazine article highlighting Cybersecurity Awareness Month, Chris Spargen expresses how being an early adopter of the latest security updates will lead to a more secure organization.
In this Beta News article, John Grancarich encourages patience while navigating Zero Trust and gives 7 key considerations for adopting a Zero Trust architecture.
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. Fortra's experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.
In this ITPro Today case study, find out why Summit Credit Union adopted robotic process automation (RPA) technology to streamline and improve an outdated online loan application process.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his guest essay for The Last Watchdog, Eric George, Director of Solutions Engineering at PhishLabs by Fortra, explains what ransomware is, who the high-stake threat actors are, and how organizations can defend themselves against ransomware attacks.
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at Fortra, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.
With so much information published on Zero Trust, it’s easy to see why organizations remain unsure about what it means, let alone move forward with adopting a framework. In this Help Net Security video, John Grancarich cuts through all the material and aligns it with the process recommended by NIST to create a Zero Trust Playbook.
John Wilson, Senior Fellow, Threat Research at Fortra features in this episode of Infosec’s Cyber Work Podcast. John covers all aspects of email fraud including business email compromise and phishing, and shares career tips and advice for budding threat researchers at all levels.
Infosecurity Magazine’s Editorial Director, Eleanor Dallaway, interviews Donnie MacColl, Senior Director of EMEA Technical Services and DPO at Fortra, live from Infosec22.
What can businesses do to take a more proactive stance in the battle against phishing attacks? Find out in this Expert Insights interview with Billy Smith and Mike Jones of Fortra.