News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Live Webinar
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Blog
Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting
Mon, 04/08/2024
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Live Event
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
News Article
Dark Reading: Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
By Tyler Reguly on Fri, 03/15/2024
Tyler Reguly spoke with Dark Reading about Microsoft’s Patch Tuesday security update for March.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
News Article
PYMNTS: FBI Sounds Alarm on AI-Driven Infrastructure Hacking
By Antonio Sanchez on Thu, 03/14/2024
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
Is the AS/400 Dead?
By Tom Huntington on Mon, 02/19/2024
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.
News Article
TechNational: How Can Companies Use AI in the Workplace?
By Donnie MacColl on Mon, 02/12/2024
Donnie MacColl spoke to TechNational about how organizations can safely integrate AI into business processes to strengthen cyber defenses.
On-Demand Webinar
DB2 Web Query Is Unsupported. Now What?
Using an outdated business intelligence solutions like Query/400 or an unsupported product like Db2 Web Query for i can put limitations on your data. Watch this video to learn how you can unlock your data’s full potential by using Sequel.
On-Demand Webinar
Bringing Security to the Cloud
Mon, 01/22/2024
Learn key strategies and elements for effective cloud security in this Alert Logic webinar with Nicholas Laing, Solutions Engineer at Fortra. In this webinar, we cover: Challenges of cloud security Drivers for cloud adoption Critical questions for cloud strategy Cloud adoption phases Security considerations Architectural approaches Security responsibilities and cloud frameworks Key cloud security...