News Article
Cyber Defense Magazine: Fortra’s Best-in-Class Cybersecurity Portfolio
By Matthew Schoenfeld on Fri, 09/15/2023
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. At Fortra, we're creating a stronger, simpler strategy for protection. Matthew Schoenfeld spoke to Cyber Defense Magazine about how Fortra is reshaping the cyber landscape.
Blog
What is IT Process Automation? How to Build a More Resilient IT Department
Thu, 09/14/2023
As IT environments grow increasingly complex—and budgets and staff resources shrink—IT teams everywhere are looking for ways to fill the gaps. And they’re turning to IT process automation software. In fact, per Fortra’s recent IT automation survey , 72 percent of users say they’re looking to expand automation within the next year. Curious how your IT department can utilize a process automation...
Blog
Patch Tuesday Update September 2023
By Tyler Reguly on Thu, 09/14/2023
This is my 211th Patch Tuesday in a role where I’m performing a complete analysis of the released Microsoft patches. It’s amusing to me to see what has changed and what has stayed the same.
On-Demand Webinar
What the White House’s 2023 National Cybersecurity Strategy Means to Your Security Plan
By Bob Erdman
Watch this on-demand webinar to learn more about the White House’s 2023 National Cybersecurity Strategy and how Fortra can help you implement some of its objectives to better secure your organization.
On-Demand Webinar
How to Prevent and Uncover Suspicious Activity on IBM i
By Sandi Moore
Preventing and detecting suspicious activity is more important than ever, watch this webinar and learn how to find and block intrusion attempts on the IBM i.
News Article
Help Net Security: How Cybercriminals Use Look-Alike Domains to Impersonate Brands
By Eric George on Wed, 09/13/2023
In a video featured on Help Net Security, Eric George discusses why brands should take domain impersonation threats seriously and highlights strategies to resolve this problem.
Blog
Generative AI in Cybersecurity
By Antonio Sanchez on Tue, 09/12/2023
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Guide
2023 Domain Impersonation Report
Current Domain Threats, Trends, and Techniques Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal. In the 2023 Domain Impersonation Report, we review look-alike domain...
Guide
The Ultimate Guide to Data Protection
We live in a data-driven world. As businesses become more reliant on data and people are more aware of the importance of protecting their personal data, data protection becomes a core part of business success. Download this comprehensive guide to learn: What data protection is Why it is important How businesses can better protect the data they store and process Complete the form to access the...
Blog
INFOGRAPHIC: How to Protect Your Data from Smishing and Vishing
Mon, 09/11/2023
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
News Article
Authority Magazine: Women Reshaping the Cybersecurity Industry
By Kate Bolseth on Thu, 09/07/2023
Kate Bolseth spoke with David Leichner from Authority Magazine about her career. Find out what concerns and excites Kate the most about the cybersecurity industry and discover what Fortra is doing to help reshape it.
Guide
Preventing Domain Impersonation
How to Stop Look-Alike Domains and Spoofing In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic. It’s crucial that companies take preventive measures against look-alike...
Blog
What Is Cloud Security?
By Antonio Sanchez on Wed, 09/06/2023
Cloud security is the collection of plans, processes, and technologies that allow you to safely manipulate cloud-based data at rest, in use, and in motion. A comprehensive cloud-based security strategy encompasses several key elements.
Guide
From Data Protection to Cyber Culture
Is your awareness training program resonating with employees? Terranova Security, in collaboration with recognized research firm IPSOS, answer this question and many more in this new report that truly reflects employee attitudes towards security awareness across the globe.
Guide
The 2022 Phishing Benchmark Global Report
Drive effective behavior change and strengthen security awareness initiatives with in-depth phishing benchmarking data.
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Blog
5 Phases of a Successful AP Automation Project
By Greg J. Schmidt on Thu, 08/31/2023
Are you considering AP automation? Here's what you need to know to make your project a success.
Blog
Industry Advice from Fortra’s EVP of Technical Solutions, Tom Huntington
Wed, 08/30/2023
During his nearly 35 years at the company, Tom Huntington, EVP of Technical Solutions, has contributed greatly to Fortra’s growth and vision.