Blog
INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks
Wed, 08/02/2023
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
On-Demand Webinar
MFT in 45 minutes
By Ray Sutton
Managed File Transfer (MFT) technology enables modern businesses to secure and automate file sharing, collaborate with external parties and seamlessly integrate with cloud environments.
Discover the power of Fortra’s GoAnywhere, chosen as the best MFT solution in the market by users, in this video. In just 45 minutes, you'll gain insights into: Streamlining file...
News Article
CFO Dive: AI Linked to New Crop of Business Email Scams
John Wilson spoke to CFO Dive about Fortra’s recent report on business email compromise. He discussed the recent surge in the number of malicious or untrustworthy emails detected in corporate inboxes.
News Article
Digital Journal: FBI’s Warning Around Sextortion Schemes
The FBI has issued a warning about the use of "deepfakes" in a new wave of sextortion schemes. In his interview with Digital Journal, John Wilson examines the techniques used and provides valuable tips to help protect children from such scams.
On-Demand Webinar
IBM i Capacity Planning – Cloud, On-Prem, or Hybrid?
By Randy Watson
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.
News Article
ConsumerAffairs: Playing Around with AI? An Expert Says There are Potential Dangers
In this Consumer Affairs article, Josh Davies highlights the potential risks and provides tips to keep you safe online.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...
News Article
Lifewire: Scam AI Apps Are Tricking Users
Josh Davies spoke to Lifewire about the risks of using such apps and how to protect yourself from these scams.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Press Release
Fortra Announces Managed Web Application Firewall to Protect Critical Web Apps and APIs from Compromise
Fully managed service provides customers with comprehensive threat protection, reducing application downtime, and allowing internal resources to focus on product development
Guide
The Ultimate Guide to DORA Compliance for the Financial Sector
The Digital Operational Resilience Act (DORA) applies to over 22,000 financial entities and ICT providers in the EU.
It introduces an end-to-end framework for effective risk managements, ICT and cyber security operational capabilities, and third-party management to assure the consistent delivery of services along the financial value chain.
This comprehensive guide covers everything you need to...
Blog
What Is a Cloud Access Security Broker (CASB)?
Wed, 04/26/2023
The proliferation of cloud computing has heightened the need for organizations to monitor and manage the safe use of cloud services. Cloud access security brokers, or CASBs, provide the necessary security features to protect cloud-based resources as they’re accessed while also detecting threats and controlling data that flows through the cloud.What Are the 4 Pillars of Cloud Access Security...
On-Demand Webinar
Expert Advice on IBM i in the Cloud
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Blog
Supply Chain Compromise: The Risks You Need to Know
Tue, 04/11/2023
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Blog
3 Tips to Strengthen AWS Container Security
Thu, 04/06/2023
Containers are fundamental to swift, reliable AWS deployment. So, how can you strengthen AWS container security?
News Article
Forbes Advisor: Beware Of Loan Scams
In his latest Forbes Advisor article, John Wilson discusses loan scams and shares 7 red flags to help identify and avoid fraudulent loan offers.
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.