Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
Quote
Get Custom Penetration Testing Services Pricing
Find Your VulnerabilitiesCore Security's Security Consulting Services (SCS) simulates trending and new cyber threats to uncover security weaknesses, comply with regulatory compliance standards, and strengthen your security landscape. See how affordable pen testing can be, complete the form and get a customized quote from our experts based on your security needs.Get More With Security Consulting...
News Article
IT Nerd: Exclusive Insights from Fortra’s 2024 Penetration Testing Report
By Chris Reffkin on Fri, 06/28/2024
Fortra CISO Chris Reffkin spoke with IT Nerd and shared valuable insights from Fortra’s 2024 Penetration Testing Report.
News Article
Investopedia: How to Report Identity Theft
By John Wilson on Fri, 06/07/2024
What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Blog
Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting
Mon, 04/08/2024
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
News Article
Solutions Review: Cybersecurity and the AI Executive Order
By Josh Davies on Thu, 12/21/2023
Josh Davies joined Solution Review's 5th annual Insight Jam Live.
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Consumer Affairs: More Airline-Related Consumer Data Is Showing Up on the Dark Web
Fri, 12/15/2023
Airline customers need to be aware that their PII data could be for sale on the dark web. Nick Oram looks at how attackers use this data and provides tips on how to keep your data secure.
Blog
RPA vs. API: Differences and Use Cases
Thu, 11/30/2023
At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
News Article
Lifewire: Scam AI Apps Are Tricking Users
Josh Davies spoke to Lifewire about the risks of using such apps and how to protect yourself from these scams.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Press Release
Industry-first Integration from Fortra Allows Organizations to Supercharge Their Automation Footprint
Newly released Automate Execution Method leads to improved process efficiency, increased productivity, and faster turnaround times.