Join this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation...
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
The first thing that anyone looking at the Microsoft security guidance this month will notice is the inclusion of Common Weakness Enumeration (CWE) information.
Join this live webinar on June 6th to learn more about AI and other document and forms management trends and how you can get started implementing them.
Your organization’s data is its most valuable asset. Retaining data properly helps ensure you meet industry compliance requirements and keep the trust of your customers or trading partners. Whatever your organization’s specific data retention policies may be, you’ll need to ensure that your data is secured at rest as well as in motion, with robust auditing and reporting of all file movements.
How can organizations create a work environment to retain cybersecurity talent? John Grancarich shares insights on keeping employees engaged and decreasing turnover rates.
It is the largest phishing simulation in the world: Fortra’s Terranova Security’s yearly Gone Phishing Tournament (GPT) tests over 1.37 million end users across 142 countries and 31 languages. The results don’t lie – but this year they may be surprising.
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Fortra announced today their recognition as a “Top Player” in The Radicati Group’s Secure Email Market Quadrant, 2024. The Radicati Group’s analysis found that Fortra provides both breadth and depth of functionality while shaping the market with innovative technology and a compelling strategic vision.
Session Details **This session meets at multiple times.** Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. On May 8, Fortra CISO Chris...
The U.S. House of Representatives passed a bill that would ban TikTok unless its China-based parent company relinquishes its stake. Antonio Sanchez spoke with The Last Watchdog and shared his observations.