-
Alan Jordan |
Greg J. Schmidt
On-Demand Webinar
Why Don't Companies Role Swap?
Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Blog
6 Pro Tips from the 2024 State of IBM i Security Study
Mon, 05/06/2024
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2024 State of IBM i Security Study!
On-Demand Webinar
IBM Access Client Solutions for System Administration
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
News Article
InformationWeek: What the American Privacy Rights Act Could Mean for Data Privacy
By Antonio Sanchez on Fri, 04/26/2024
How could the American Privacy Rights Act impact companies and consumers? In his discussion with InformationWeek, Antonio Sanchez shared his observations about the new draft legislation.
News Article
CyberScoop: Congressional Privacy Bill Looks to Rein in Data Brokers
By Antonio Sanchez on Thu, 04/25/2024
Antonio Sanchez spoke with CyberScoop about the new congressional bill that aims to regulate data brokers.
News Article
MOTOR: EVs and Cybercrime
By Antonio Sanchez on Tue, 04/23/2024
What are the cybersecurity must-haves for electric vehicles? In this MOTOR Information Systems article, Antonio Sanchez discusses the EV market and potential cyber threats related to EVs.
News Article
IT Nerd: American Privacy Rights Act Unveiled
By Antonio Sanchez on Tue, 04/23/2024
The recently unveiled American Privacy Rights Act is a significant step toward establishing a federal data privacy standard in the U.S. Antonio Sanchez spoke with IT Nerd and shared his observations about the legislation.
News Article
Help Net Security: Cybercriminal Adoption of Browser Fingerprinting
Wed, 04/17/2024
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
News Article
Cyber Defense Radio: Data Privacy on Social Media
By Antonio Sanchez on Wed, 04/17/2024
Antonio Sanchez spoke to Cyber Defense Radio about mitigating the risks of data leaks and protecting personal information in the age of social media.
Datasheet
Powertech RSA SecurID Agent for IBM i
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
Blog
Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting
Mon, 04/08/2024
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
News Article
The Last Watchdog: Will the U.S. Senate Vote to Ban TikTok?
By Antonio Sanchez on Fri, 03/29/2024
The U.S. House of Representatives passed a bill that would ban TikTok unless its China-based parent company relinquishes its stake. Antonio Sanchez spoke with The Last Watchdog and shared his observations.
News Article
Diginomica: US Executive Order Promises Privacy Progress
By Wade Barisoff on Fri, 03/22/2024
The recent US Executive Order promises progress in privacy protection. In this Diginomica article, Wade Barisoff shares his observations and discusses how this EO can help protect sensitive personal data.
On-Demand Webinar
Control Costs and Boost Productivity with IBM i Automation
Tue, 03/19/2024
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Datasheet
When to Use Robot HA, PowerHA, or Both
Discover the relationship between Fortra and IBM regarding Robot HA and PowerHA as well as when it is advantageous to use each one or both.
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.