Resources

Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Blog

Patch Tuesday Update November 2023

This month brings us 63 Microsoft CVEs and 15 non-Microsoft CVEs, with Microsoft continuing the recent trend of splitting out CVEs. To understand this a bit more, we need to talk about CVE Numbering Authorities or CNAs.
On-Demand Webinar

After AI: Cyber Predictions for 2024

Watch this on-demand webinar to hear cybersecurity experts from Fortra and guest Principal Analyst Jess Burn, Forrester, make their predictions on what will shape the landscape next year and beyond.
Video

Getting Started with IBM i Security: Malware/Ransomware

Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware. If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Guide

Gaining Control of Financial Services Cybersecurity Regulations

Here’s your one-stop guide to cybersecurity regulations for the financial services industry — from the U.S. to the UAE. Find out how Fortra’s powerful portfolio can streamline financial service security compliance for your organization. Financial Cybersecurity Regulations to Know PCI DSS — Protecting the payment card industry against liability SWIFT — International electronic messaging...
Blog

What is Hyperautomation?

For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen. Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
Blog

What Is Cybersecurity Maturity?

A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Guide

10 Common Security Misconfigurations and How to Fix Them

Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible? Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application...
On-Demand Webinar

Make the Most of Showcase with Version 10

Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
On-Demand Webinar

How to Transfer Data Securely When Moving to The Cloud

As more and more businesses move to a multi-cloud strategy, transferring data between cloud platforms has become a crucial aspect of the migration process, and due to the numbers of platforms and interfaces companies work with today, security, auditing, and maintainability of data transfers is growing ever more difficult.As a result of all the added complexity, operational expenses and security...
On-Demand Webinar

How to Avoid the Biggest Mistakes in IBM i Security

Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.