Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that reduces the costly...
There are many different strategies a company can employ to help drive their organization to the next level. But why not use what you already have in your hands? Connect your content, documents, and information together to drive your business to the next level.
You already know and love the flexibility of Sequel Data Access. You can run queries on the fly, create top-notch reports, and build dashboards your users love.
Adam Burns, Director of Cybersecurity at Digital Guardian, writes in Teiss magazine about the importance of workplace mentoring in building and maintaining cybersecurity talent.