Join our live webinar on June 18th to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can...
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every...
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP)...
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
In this webinar, we dive into common factors causing DLP and compliance programs to struggle, share top methods to address those factors and improve your current program, and advise on how to stay ahead of the ever-evolving threat landscape.
Since keeping the bad at bay is the rallying cry of the day, enterprises need comprehensive protection that spans the entire lifecycle of threats from the staging of email-borne threats outside your organization to active threats landing in the inbox. Fortra’s Advanced Email Security solutions do just this—whether you are operating in the cloud, in a hybrid environment, or on-prem through a complete solution, we can help you solve your toughest email security challenges.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his guest essay for The Last Watchdog, Eric George, Director of Solutions Engineering at PhishLabs by Fortra, explains what ransomware is, who the high-stake threat actors are, and how organizations can defend themselves against ransomware attacks.
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.