Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Infrastructure Protection for Proactive Security
By Nick Hogg
Infrastructure Protection for Proactive Security
Today’s threat landscape is moving so rapidly that it’s essential to anticipate attacks and adapt your cybersecurity strategy to avoid becoming the next security breach. Such devastating breaches can cripple an organization, slowing or halting day-to-day operations and doing significant harm to a business’ reputation.
Join our infrastructure...
News Article
Forbes: Common Online Scams and How To Avoid Them
From fake holiday home rentals to counterfeit medications, online scams are now an unfortunate common occurrence. Forbes contributor, John Wilson takes a detailed look at online scams and provides 5 ways to protect yourself from them.
Originally published on Forbes Advisor.
Excerpt:
“Mary was lonely. The recently divorced mom of three was ready to dip her toe back into the Orlando, Florida,...
News Article
Keeping Personal Data Secure
With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at Fortra looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from Fortra in 2022.
News Article
AMEX Business: Top 5 Cybersecurity Threats for Small Businesses
What are the cybersecurity threats small-business owners need to be aware of and how can they be addressed?
Press Release
Vishing Attacks Reach All Time High According to Latest Agari and PhishLabs Report
Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months (Q1 2022 to Q1 2021), according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, both of which are part of the Fortra cybersecurity portfolio.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.
Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
News Article
Blunting BEC Capers that Continue to Target and Devastate SMBs and Enterprises
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
Datasheet
Fortra's Security & Automation Portfolios
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that reduces the costly...
Datasheet
Fortra Cybersecurity
Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way.
It’s time to protect your organization with proactive, automated...
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
What is the Value of SIEM?
By Robin Tatam on Wed, 03/08/2017
As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...