Press Release
Fortra Introduces New Integrations for Offensive Security
Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
News Article
ABC11 EyewitnessNews: FBI Warns of Teens Being Targeted in Sextortion Scams
By John Wilson on Tue, 08/01/2023
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
On-Demand Webinar
Modernize Your IBM i Spooled Files and PC Reports Management
The traditional style of data and report management isn’t fit for our modern, fast-paced business environment. Watch this recorded session to discover Webdocs and how you can use it to modernize the way you manage your spool files and PC-based reports.
News Article
Cybersecurity Insiders: The Looming Threat of Business Email Compromise
By John Wilson on Thu, 07/20/2023
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
News Article
The Last Watchdog: Fortra Researchers Find Email Impersonation Attacks Climbing to an All-Time High
By John Wilson on Mon, 07/17/2023
John Wilson spoke to The Last Watchdog and discussed the key findings of Fortra’s recent research on business email compromise (BEC).
Datasheet
Webdocs Forms Management
Increase efficiency with faster data capture and integrate with your back-end systems using Webdocs Forms Management.
News Article
CFO Dive: AI Linked to New Crop of Business Email Scams
John Wilson spoke to CFO Dive about Fortra’s recent report on business email compromise. He discussed the recent surge in the number of malicious or untrustworthy emails detected in corporate inboxes.
News Article
Digital Journal: FBI’s Warning Around Sextortion Schemes
The FBI has issued a warning about the use of "deepfakes" in a new wave of sextortion schemes. In his interview with Digital Journal, John Wilson examines the techniques used and provides valuable tips to help protect children from such scams.
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Blog
The Benefits of Automating IBM i Spool File Conversion and Delivery
By Greg J. Schmidt on Wed, 06/14/2023
Discover how automating your IBM i spool file management and delivery can make your data more accessible to users and easier to deliver for administrators.
News Article
Forbes Advisor: Beware Of These Vacation Rental Scams That Con Guests And Hosts
In his May contribution to Forbes Advisor, John Wilson sheds light on vacation rental scams targeting guests and hosts.
Fortra Cybersecurity Software Bundles
Learn how Fortra software bundles feature powerful product combinations that solve complex cybersecurity challenges in innovative ways.
Offensive Security Product Bundles
Our modern threat landscape is constantly evolving, and a proactive approach must now be as central to any security strategy as defensive tactics. Reactive controls will always be a necessity, but organizations can also work to reduce the attack surface by anticipating a breach and detecting and responding to security weaknesses before serious impact is felt. Get ahead of attackers with...
News Article
Forbes Advisor: Pig-Butchering Scams
In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
On-Demand Webinar
Take Your Forms Creation and Delivery to the Next Level
Forms management expert Greg Schmidt breaks down the main ways a modern forms solution can provide the flexibility and efficiency today’s organizations need.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
News Article
Bloomberg Tax: Tax Pros and Their Clients Can Be Targets of ‘Vishing’ Scams
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
News Article
Forbes Advisor: Beware Of Loan Scams
In his latest Forbes Advisor article, John Wilson discusses loan scams and shares 7 red flags to help identify and avoid fraudulent loan offers.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...