News Article
FedTech Magazine: How CMMC 2.0 Differs from the Original
By Antonio Sanchez on Tue, 01/16/2024
Antonio Sanchez spoke to FedTech Magazine about the notable updates in Cybersecurity Maturity Model Certification 2.0 compared to the original.
Video
IBM's Steve Will Talks IBM i
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The topics...
News Article
The Last Watchdog: Cybersecurity Takeaways of 2023 - And What’s Ahead in 2024
By Antonio Sanchez on Mon, 12/25/2023
Antonio Sanchez spoke to The Last Watchdog and shared his thoughts on the evolving cybersecurity landscape.
News Article
Help Net Security: Exploring the Impact of Generative AI in the Presidential Election
Mon, 12/25/2023
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
News Article
Solutions Review: Cybersecurity and the AI Executive Order
By Josh Davies on Thu, 12/21/2023
Josh Davies joined Solution Review's 5th annual Insight Jam Live.
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Digital Journal: Restricting Electronic Brains
By Josh Davies on Thu, 12/14/2023
Josh Davies spoke to Digital Journal about the first global guidelines for AI security developed by the U.K.’s NCSC and the U.S.’s CISA.
page
CIS Critical Security Controls
The CIS Critical Security Controls are widely accepted as a foundational security reference point for the modern enterprise. Fortra’s advanced portfolio of solutions provides organizations with the tools they need to meet the Controls and advance their cybersecurity maturity.
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
On-Demand Webinar
Make the Most of Showcase with Version 10
Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
Guide
6 Cybersecurity Thought Leaders on Data Protection
Data protection is essential for the health and survival of any organization. Getting the support of corporate leadership is critical to fully protect your valuable assets. In this eBook, six experts share their perspectives of: The current challenges surrounding data protection What the future of data protection may look like Ways to gain support within an organization for your data protection...
Blog
Securing the Government and Public Sector in 2024
Fri, 09/29/2023
Securing the public sector requires knowing the industry, its regulations, and its most prevalent threats. Discover Fortra’s government security solutions.
Blog
INFOGRAPHIC: How to Protect Your Data from Spoofing Attacks
Tue, 09/19/2023
A social engineering attack needs only one thing to be successful: the trust of the targeted party. Here are 7 ways to protect against email spoofing.
Blog
INFOGRAPHIC: How to Protect Your Data from Smishing and Vishing
Mon, 09/11/2023
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
Guide
The 2022 Phishing Benchmark Global Report
Drive effective behavior change and strengthen security awareness initiatives with in-depth phishing benchmarking data.