Resources

Guide

RPA & API Integration

The Evolution of RPA Robotic process automation (RPA) has taken the world by storm in recent years by automating mundane tasks that humans perform manually, providing vast productivity gains. After years of automation being relegated to IT departments, RPA has progressed to what it is today—decentralized automation accessible to all employees throughout an organization, from citizen developers to...
Blog

What is SIEM? How It Works, Best Practices for Implementation & More

Learn about Security Information and Event Management or SIEM, how an organization can get the most out of its SIEM technology and best practices for implementing a solution in this blog. SIEM, or Security Information and Event Management, is a type of software solution that provides threat detection, real-time security analytics, and incident response to organizations. It’s a popular IT security...
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...
News Article

Forbes: 1 in 4 ID Theft Victims Had Thousands Of Dollars Stolen During The Pandemic. Here’s How To Keep Your Financial Info Safe

An alarming number of Americans say they experienced identity theft, or attempted identity theft, during the pandemic. Forbes contributor, Kelly Anne Smith takes a detailed look at identity theft and provides 5 tips on how to protect yourself from it. Featuring John Wilson , Senior Fellow, Threat Research. Originally published on Forbes Advisor . Excerpt: "The financial account fraud happened in...
Guide

2022 Pen Testing Report

How effective are your existing security controls against a skilled threat actor? With cyber attacks now a common place occurrence, organizations are regularly having to ask themselves this question, and often get the answer only after an attack occurs. Penetration tests are a safe way to proactively evaluate cybersecurity programs, uncovering and exploiting security threats to find out what level...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
Blog

Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs

It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are susceptible to a myriad of advanced email threats and socially engineered attacks, such as executive or brand impersonation. According to IC3’s Internet Crime Report, over $44 million in losses in 2021 were a direct result of malicious phishing and advanced email scams.
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
News Article

Forbes: Common Online Scams and How To Avoid Them

From fake holiday home rentals to counterfeit medications, online scams are now an unfortunate common occurrence. Forbes contributor, John Wilson takes a detailed look at online scams and provides 5 ways to protect yourself from them. Originally published on Forbes Advisor . Excerpt: “Mary was lonely. The recently divorced mom of three was ready to dip her toe back into the Orlando, Florida...
News Article

Keeping Personal Data Secure

With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at Fortra looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from Fortra in 2022.