Resources

Guide

What Experts Have to Say About Choosing the Right Cybersecurity Frameworks

How to Get the Most Out of Cybersecurity Best Practice Frameworks Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our...
Blog

Patch Tuesday Update May 2024

This month everyone is going to be talking about CVE-2024-30051 since it is known that it is being used in QakBot and other malware. This is an update that should be applied as soon as possible given the nature of the vulnerability and the fact that real world exploitation has been confirmed.
Blog

The Value of a Tech Update

When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
Guide

2024 Pen Testing Report

Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide...
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Blog

Automated Integration: The Fuel for Your Digital Transformation

As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration, you could end up with a tangled mess of siloed applications and systems. And while automation and application...
Blog

Top 8 Benefits of Network Monitoring

Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Blog

Patch Tuesday Update March 2024

This month’s Patch Tuesday drop includes a total of 65 CVEs – 61 issues by Microsoft, 3 issued by Chrome, and 1 issued by Intel. For those worried about the Intel update, which requires you apply both an Intel microcode update and a Microsoft update, it only applies to Atom processors.
Guide

2023 Gone Phishing Tournament Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.