Join our live webinar on June 18th to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
We let email threats slip by us every day. Discover what popular ploys your team might be missing and how Fortra’s advanced security solutions can help.
How can organizations stay safe in the age of AI? In this Technology Record article, Theo Zafirakos discusses the dangers of AI and provides expert insights on mitigating those risks.
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.
Security is the responsibility of all employees, from the top down. Theo Zafirakos joined the eChannelNews Security Podcast to discuss how to best implement security awareness programs and the effective strategies for building a security-aware culture.
Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.