With the release of the 2023 Zero Trust Security Report, it’s a good time to reflect on the seismic shifts that have happened in the industry regarding network security. Discover key insights and impacts of Zero Trust in 2023.
In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
First there was the boom – now there’s the bust. Organizations that invested in myriad new solutions to handle the complexity of myriad security problems now have a different problem on their hands – how do you handle all of the vendors?
Companies are finding there’s a different kind of noise when too many providers are in the mix, and they’re looking to cut back. They still need the...
It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not.
Criminal hackers go after the...
Forms management expert Greg Schmidt breaks down the main ways a modern forms solution can provide the flexibility and efficiency today’s organizations need.
In his Q&A with VMblog, Antonio Sanchez talked about Fortra’s activities at RSA, highlighting our latest product innovations and sharing industry insights.
The proliferation of cloud computing has heightened the need for organizations to monitor and manage the safe use of cloud services. Cloud access security brokers, or CASBs, provide the necessary security features to protect cloud-based resources as they’re accessed while also detecting threats and controlling data that flows through the cloud.
What Are the 4 Pillars of Cloud Access Security...
If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
Each year the threat landscape continues to evolve, and security measures must evolve with it. Recently released, Fortra’s 2023 Penetration Testing Report offers a view into the usage and perception of pen testing, with the intent to determine how these services must adapt in the future. Explore a few salient points in this edition that betrayed changes in the penetration testing landscape.
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Last year, Renee and her team introduced a new partner program and led partners through the rebrand to Fortra. Here's her take on these achievements and a look at the strategic shifts that will be required for cybersecurity moving forward.
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Managed detection and response (MDR) would be nothing without a SOC (security operations center). These are the people who make Alert Logic's MDR services so dependable. It’s time you met them.
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Microsoft’s Digital Crimes Unit (DCU), cybersecurity software company Fortra™ and Health Information Sharing and Analysis Center (Health-ISAC) are taking technical and legal action to disrupt cracked, legacy copies of Cobalt Strike and abused Microsoft software, which have been used by cybercriminals to distribute malware, including ransomware. This is a change in the way DCU has worked in the...