Resources

Blog

Will 2024’s Presidential Election Day Be Groundhog Day When It Comes to Nation-State Email Attacks?

With 2024's presidential election around the corner, Fortra discusses the blunt-force impact of campaigns not hardening their cybersecurity, such as campaign impersonation, donation scams and fraud, and the possibility that it will be cybercriminals who decide the next President of the United States—not voters.
Blog

Understanding DMARC Reports

Why is it so important to analyze DMARC reports? Well, it makes it so organizations can detect malicious emails and prioritize source configuration, all of which is crucial for maintaining their email security.
On-Demand Webinar

Intro to Email Security Bundles

This webinar discusses how inefficiencies in combating phishing result in lost time and productivity for employees and internal SOC teams. Luckily, Fortra Email Security has introduced interoperable bundle packages that can stop advanced email threats over the entire lifecycle from pre-delivery staging to post-delivery remediation. Mike Jones outlines these bundle...
Blog

How to Defend Against Stegomalware

Stegomalware is still a relatively unknown term but is becoming more widely leveraged in malware. So you need to know about this semi-low-tech, yet innovative tactic that is imperceptible to the human eye.
Blog

What You Need to Know About Stegomalware

It all sounds like the stuff of Sherlock Holmes or “Mission Impossible”, but steganographic malware, or stegomalware for short, is a real thing that broadly describes a host of tactics used to hide data in plain sight.
On-Demand Webinar

Is Malware Using Steganography on Your Network?

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. In this webinar, Dr. Steve Jeffery outlines...
Blog

How to Set Up DMARC: Step-by-Step Guide

We'll explain how to configure DMARC for your company's email, including what you'll need and how to add DMARC to your DNS. Just follow these DMARC setup steps! But before we begin, here’s a high-level overview of how to add DMARC to your DNS.Add your DMARC record into your DNSSelect the TXT record typeAdd the host value (see details below)Add the value information (see details below)Save the...
Blog

Preventing Email Leaks in Business Environments

By understanding email data leaks, their value to attackers, and their root causes, organizations can stay savvy and set up the right tools to thwart many email-targeting attempts.
Blog

Frost Radar Names Fortra as Email Security Leader

We are thrilled to announce that Frost & Sullivan has ranked Fortra as a leader in our space. With the release of the Frost Radar for Email Security™, Frost & Sullivan has determined that Fortra Email Security is a leader in the industry, having increasing its revenue distribution in North America by 30%, as well as penetration in the cloud security market and in the banking and finance verticals...
On-Demand Webinar

Is an On-Premise SEG Still Relevant in 2024?

In an era dominated by cloud computing and SaaS solutions, the relevance of on-premise infrastructure, including SEGs, often comes into question. This webinar explores the enduring significance of on-prem SEGs in 2024, shedding light on why organizations may find them indispensable despite the allure of cloud-based alternatives. In this webinar, Dr. Steve Jeffery...
Blog

Are You Ready for PCI DSS 4.0?

PCI DSS 4.0 is here. If your organization handles PII data, you will need to be compliant with the new updates. We take a look at the new version and what it takes to stay compliant.
Guide

TAG ROI Assessment for Fortra Cloud Email Protection

Learn why TAG Infosphere's third-party report on Fortra's Cloud Email Protection projects a significant return on investment (both qualitative and quantitative) that customers can experience.
Blog

Microsoft Office 365 + Cloud Email Gateway: All You Need in a Cloud-First World

According to a recent Cloud Security Alliance report, 98% of organizations worldwide use cloud services, including SaaS applications, complete cloud-native networks, and email services. It’s an overdue modernization that eliminates physical infrastructure to drive cost savings and integrate services for improved productivityChasing this move, cybercriminals intent on account takeover are evolving...
On-Demand Webinar

How to Mitigate Three Prevalent Advanced Email Threats Webinar

Watch Fortra experts, Cary Hudgins and Mike Jones, as well as Forrester Principal Analyst, Jess Burn, navigate the sophisticated email attacks that continue to prey on enterprise users. Advanced human-targeted attacks that trick unsuspecting recipients into interacting with or responding are becoming more pervasive, like quishing (aka QR code phishing), social engineering and O365 lures, and so...
Blog

Active Phishing Campaign: Tax Extension Help Lure

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender VerificationSender’s Email: ogawa@kidscorp[.]jp Sender’s Name: Beth KolcunReply-To Address: beth...
Blog

From Secure Email Gateway to Next-Gen Secure Email

The secure email gateway (SEG) worked for decades, no doubt. It was truly the first line of defense against email-based threats that took advantage of people and technology to enable fraud. Those of us who have dedicated our lives to improving this industry are grateful for the work of companies like Symantec and Proofpoint, which have spent years protecting people and organizations from viruses...
Blog

Active Phishing Campaign: Yousign HR Lure

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender VerificationSender’s Email: [email protected] Sender’s Name: Yousign for HR...