Resources

On-Demand Webinar

Elevating Cloud Security: MFT Best Practices & Insights

Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. A robust Managed File Transfer (MFT) solution can provide the security and control needed to move data confidently between systems, locations, users, and trading partners. In this webinar, we will delve into the...
Guide

What Experts Have to Say About Choosing the Right Cybersecurity Frameworks

How to Get the Most Out of Cybersecurity Best Practice Frameworks Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our...
Blog

Patch Tuesday Update May 2024

This month everyone is going to be talking about CVE-2024-30051 since it is known that it is being used in QakBot and other malware. This is an update that should be applied as soon as possible given the nature of the vulnerability and the fact that real world exploitation has been confirmed.
On-Demand Webinar

[WEBINAR] Security Leader Panel Discussion

Session Details Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. Fortra CISO Chris Reffkin leads a panel of...
On-Demand Webinar

How Fortra Enables Your Zero Trust Strategy

The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can...
Blog

The Value of a Tech Update

When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
Guide

2024 Pen Testing Report

Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide...
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.