Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
Core Impact allows organizations to easily and efficiently conduct penetration tests, using the same techniques as today’s threat actors to assess the security of an IT environment. With an intuitive interface, security professionals can easily uncover and safely exploit security weaknesses, minimizing risk and protecting critical assets. Core Impact can be used across vectors and helps centralize...
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
Intelligent CIO spoke to nine business leaders to get their insights on what businesses can do to help address the problem. One of them was Donnie MacColl, Director of EMEA Technical Services, Fortra.
In Intelligent CISO, Adam Burns Director of Cybersecurity at Digital Guardian by Fortra, offers some top tips for building a culture of cybersecurity and ensuring productive communication between the CISO and the board.
HelpSystems, a cybersecurity and automation software provider, today announced that CRN®, a brand of The Channel Company, has awarded the company with a prestigious 5-star rating in its 2022 Partner Program Guide.
In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
John Wilson, Agari by Fortra, features throughout this CSO Online article looking at why people still fall for simple social engineering scams. Find out what “old tricks” still work and what’s new trends are emerging.
The 2022 Penetration Testing Report identifies industry trends, top security concerns and provides a close look at how cybersecurity professionals are using pen testing in the field.