Join IBM i security expert Amy Williams on June 20th to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed.
From new trends in ransomware to the way GenAI is shaping the security landscape, RSA 2024 brought together the best thought leadership in cybersecurity to tackle the tough issues.
As the world ramps up for the Paris Olympics, cyber-warriors pull out all the stops to defend against an unprecedented wave of impending threats. Find out who is most likely to attack and what global cybersecurity defenders are doing to prepare.
Being a cybersecurity professional means you’re regularly in charge of making complex decisions with real-world consequences, like choosing the right cybersecurity benchmarks, controls, frameworks, or best practices for your organization. Should you apply the CIS Controls, the NIST Cybersecurity Framework, or something else? Without overarching industry consensus, it can be...
Join our live webinar on June 18th to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
This month everyone is going to be talking about CVE-2024-30051 since it is known that it is being used in QakBot and other malware. This is an update that should be applied as soon as possible given the nature of the vulnerability and the fact that real world exploitation has been confirmed.
Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. Here’s your chance!
When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
This year, Verizon revealed record-high confirmed data breaches and started tracking third-party incidents for the first time. Find out what else is new as we review the highlights of the Verizon 2024 DBIR.
The first thing that anyone looking at the Microsoft security guidance this month will notice is the inclusion of Common Weakness Enumeration (CWE) information.
It is the largest phishing simulation in the world: Fortra’s Terranova Security’s yearly Gone Phishing Tournament (GPT) tests over 1.37 million end users across 142 countries and 31 languages. The results don’t lie – but this year they may be surprising.
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration, you could end up with a tangled mess of siloed applications and systems. And while automation and application integration may seem like...