Resources

Live Event
The Center for Internet Security (CIS) Critical Security Controls (CSC) are a trusted source of truth in the cybersecurity community. Many organizations implement the CIS CSC framework to ensure their cybersecurity programs are functioning at peak effectiveness. The latest iteration, CIS CSC v8.1, was released earlier this year. Join Matthew Jerzewski, Cybersecurity Researcher...
Live Webinar
Join GoAnywhere’s leadership team for a packed hour covering:Preview of GoAnywhere 2025 releasesWhat’s new in GoAnywhere from the second half of this yearA look at Fortra Threat Brain (a multi-vector hub of verified threat intelligence)Answers to your most common GoAnywhere questions ...
Live Event
Evolution of .NET: Advancing Post-Exploitation TacticsPowerShell and .NET have been invaluable for post-exploitation over the last several years. Many red teams use open-source C# tools like SharpHound and Rubeus to analyze environments and reach their objectives.While defenders can observe this behavior with AMSI and ETW, many public techniques exist to silence these data...
Live Webinar
The popularity of cloud-based file sharing services such as AWS, Dropbox, and OneDrive is undeniable. However, these user-friendly solutions come with some critical security drawbacks.Join Scott Messick, Lead Solutions Engineer, Fortra Dec. 12, as he discusses the pros and cons of cloud file sharing and introduce the advantages secure, managed file transfer (MFT) offers for...
Live Event
Come see Fortra at booth #33 at NAViGATE Toronto 2024 from November fourth to the sixth.
Live Event
Join us as we proudly sponsor the VMUG UserCon on November 13th! Swing by for a chat about MFT and see how we can help with your IT problems. Haven’t secured your spot yet? It’s free! ...
Live Webinar
Join IBM i expert Chuck Losinski on November 20th to learn how to solve the mystery of where your disk space is going and how to make cleanup a breeze.
Live Event
In many ways, 2024 has been a landmark year for cybersecurity. At Fortra, our cybersecurity experts have no shortage of opinions on where we’ll go next. From cyber insurers raising the bar with their own compliance requirements to shifting market dynamics, the events of 2024 will have significant consequences for the shape of the industry in the months ahead. Tune in as a...
Live Webinar
Join data access expert Greg Schmidt for a live webinar on November 14th as he demonstrates how Sequel puts the power of your business data in the hands of your users.
Live Event
Join us as we proudly sponsor the VMUG UserCon on October 24th! Swing by for a chat about MFT and see how we can help with your IT problems. Haven’t secured your spot yet? It’s free! ...
Live Event
Despite being around for 20 years and at the forefront of protecting organisations’ sensitive data, Data Loss Prevention programs still struggle to keep pace with ever-changing organisational requirements. Before you know it, your two most precious resources—time and money—are down the drain. To make matters worse, at the same time, the risk to data security just keeps getting...
Guide

Decoding the Attacker Mindset: Pen Testing Revelations

Cybersecurity isn't just about defense—it's about understanding the offense. With penetration testing, organizations can learn to think like an attacker and develop more proactive strategies that anticipate attacks. In this guide, explore 5 scenarios that provide insight into the methods and techniques deployed in real-world pen testing engagements, including: Using a password spray attack to...
Guide

The Cyber Security Hub

Access free security awareness training content on a variety of important topics, including phishing, social engineering, ransomware, passwords, and much more.
Guide

Avoid These Common Ransomware Prevention Oversights

Most breaches and data losses are caused by simple "honest" mistakes that inadvertently create security weaknesses for attackers to target. In fact 68% of data breaches originate from some type of non-malicious human element*. When it comes to ransomware prevention, if you focus too intently on your defensive cybersecurity tactics, you may be overlooking some fundamental security measures, like...
Guide

Guide to Creating a Proactive Cybersecurity Strategy

Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...