Article
The IT Automation Survey
Wed, 12/14/2022
Companies continue to embrace digital transformation to navigate the post-pandemic climate. From economic uncertainties to an ever-shifting job market, IT automation tools are helping organizations meet the moment. And as automation solutions - and strategies - have evolved, we wanted to take the pulse of our users and get a snapshot of the state of IT automation and what’s top of mind as they...
News Article
Digital Journal: Hackers Using Steganography Tactics for Malware Attacks
What is steganography? And how are criminal groups using it to exfiltrate data? Alyn Hockey, VP Product Management, explains all in this Digital Journal article and describes what measures companies can take to plug this vulnerability.
Case Study
SFT Threat Protection Helps Credit Card Company Securely Transfer Files
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.
Blog
Automation vs Hyperautomation: Learn the Differences
Thu, 11/10/2022
Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation.
Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Infrastructure Protection & Data Security Solutions
Protect business-critical data with automated security solutions that help you stay ahead of today's ever-changing threats.
On-Demand Webinar
Email Security Best Practices: How to Protect Against Advanced Threats
Fri, 09/30/2022
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance.
...
News Article
Forbes: 8 Ways To Keep Your Social Security Number Safe From Identity Theft
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
On-Demand Webinar
How to Prepare for PCI DSS 4.0
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
News Article
Crucial Tech Podcast with John Wilson: Hybridized Vishing Attacks
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
News Article
Forbes: What is Vishing, and Why is it a Threat to Your Financial Health?
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
On-Demand Webinar
Top Mistakes You Could be Making in Email Security
By Alyn Hockey
Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
Blog
What Customers Are Saying About Intermapper
Tue, 08/23/2022
Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
News Article
ZDNet: Scammers Are Using This Sneaky Trick to Bypass Spam Filters
Hybrid vishing (email-initiated voice phishing) attacks are on the rise. In this ZDNet article, John Wilson discusses the findings from the latest Agari and PhishLabs research and explains what organizations can do to help prevent hybrid vishing attacks.
Press Release
Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To Fortra's Latest Agari And PhishLabs Report
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.
Case Study
Portmade NV Saves Time and Labour Creating Customs Declarations with Automate
Learn how Portmade NV uses intelligent automation to capture, extract, and import data on customs declarations forms, saving the equivalent of 3.5 FTEs.
News Article
Computing: The Importance of Automation and the Trends Driving it
In this video, Stuart Sumner, Editorial Director of Computing and Donnie MacColl, Senior Director of Technical Services at Fortra, explore the trends surrounding the current state of automation and discuss how to create a successful implementation strategy for fast ROI.
News Article
Forbes: Scammers are Cracking Today’s More Secure Passwords
In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at Fortra, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.