Resources

Live Webinar
Fortra takes being your cybersecurity ally seriously. That’s why we’ve been challenging the security status quo in 2024, and we’ve got the tangible results to prove it. We’re leaving our mark on the market with new extended detection and response capabilities, enhanced threat intelligence, BEC research, responsive development, strategic partnerships, and more! On July 17,...
Live Webinar
Join IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington on July 18th to hear their unique perspective on the direction of this platform.
Blog

Understanding The White House’s 2024 Cybersecurity Report

To protect against mounting threats to national security via nation-state cyberattacks, domestic ransomware attacks, and threats to critical infrastructure, The White House issued its 2023 National Cybersecurity Strategy. This recently released 2024 report reviews progress made towards achieving those outlined objectives.
News Article

Investopedia: How to Report Identity Theft

What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Live Webinar
Join IBM i security expert Amy Williams on June 20th to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed.
Live Event
Managed File Transfer (MFT) technology enables modern businesses to secure and automate file sharing, collaborate with external parties, and seamlessly integrate with cloud environments. Discover the power of Fortra’s GoAnywhere, chosen as the best MFT solution in the market by users, in this webinar. In just 45 minutes, you'll gain insights into: Streamlining file...
Live Webinar
Being a cybersecurity professional means you’re regularly in charge of making complex decisions with real-world consequences, like choosing the right cybersecurity benchmarks, controls, frameworks, or best practices for your organization. Should you apply the CIS Controls, the NIST Cybersecurity Framework, or something else? Without overarching industry consensus, it can be...