News Article
FedTech Magazine: How CMMC 2.0 Differs from the Original
By Antonio Sanchez on Tue, 01/16/2024
Antonio Sanchez spoke to FedTech Magazine about the notable updates in Cybersecurity Maturity Model Certification 2.0 compared to the original.
News Article
Techopedia: Why Deepfake Technology is Both a Strength and Danger for Organizations
Tue, 01/16/2024
The dangerous side of deepfakes is exposed in this Techopedia article. Theo Zafirakos shares his tips on how to spot them and avoid falling victim to AI-generated fraud. Learn more below.
News Article
The Last Watchdog: Cybersecurity Takeaways of 2023 - And What’s Ahead in 2024
By Antonio Sanchez on Mon, 12/25/2023
Antonio Sanchez spoke to The Last Watchdog and shared his thoughts on the evolving cybersecurity landscape.
News Article
Solutions Review: Cybersecurity and the AI Executive Order
By Josh Davies on Thu, 12/21/2023
Josh Davies joined Solution Review's 5th annual Insight Jam Live.
News Article
Technology Dispatch: New AI Guidelines Signal Change Is Coming
By Josh Davies on Wed, 12/20/2023
What are the new AI security guidelines, and how will they reshape the landscape? In his Technology Dispatch article, Josh Davies discusses the Guidelines for Secure AI System Development and their impact on organizations that build or use AI.
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Consumer Affairs: More Airline-Related Consumer Data Is Showing Up on the Dark Web
Fri, 12/15/2023
Airline customers need to be aware that their PII data could be for sale on the dark web. Nick Oram looks at how attackers use this data and provides tips on how to keep your data secure.
News Article
Digital Journal: Restricting Electronic Brains
By Josh Davies on Thu, 12/14/2023
Josh Davies spoke to Digital Journal about the first global guidelines for AI security developed by the U.K.’s NCSC and the U.S.’s CISA.
News Article
Comparitech: The Best Data Protection Training Tools for Employees
Wed, 12/13/2023
Fortra’s Terranova Security was included in Comparitech’s list of the best data protection training tools for employees.
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
Blog
INFOGRAPHIC: How to Protect Your Data from Spoofing Attacks
Tue, 09/19/2023
A social engineering attack needs only one thing to be successful: the trust of the targeted party. Here are 7 ways to protect against email spoofing.
Blog
INFOGRAPHIC: How to Protect Your Data from Smishing and Vishing
Mon, 09/11/2023
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
Guide
The 2022 Phishing Benchmark Global Report
Drive effective behavior change and strengthen security awareness initiatives with in-depth phishing benchmarking data.
Blog
INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks
Wed, 08/02/2023
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
News Article
CyberRisk Alliance Podcast with John Grancarich at RSA 2023
John Grancarich, EVP Strategy, features on the CyberRisk Alliance Podcast at RSA, with host Matt Alderman.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...