Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
Blog
The Password Atmosphere – Problem, or Progress?
By Lisa Lombardo on Mon, 08/26/2024
Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog
What Is the NIST Risk Management Framework (RMF)?
By Antonio Sanchez on Mon, 08/26/2024
The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog
Comparing RPA Platforms: Fortra’s Automate vs. Microsoft’s Power Automate
By EJ Stanley on Tue, 08/20/2024
See a head-to-head matchup between RPA platforms—Fortra’s Automate vs. Microsoft’s Power Automate—and compare licensing, functionality, support, and more.
Guide
How Fortra Supports the MAS TRM Notice and Guidelines
Download this guide to learn how Fortra's solutions can help your organization comply with the MAS TRM notice and guidelines.
Blog
My Takeaways from Black Hat USA 2024
By Antonio Sanchez on Mon, 08/19/2024
The importance of resilience and business continuity dominated conversations at Black Hat USA 2024. In this blog, security expert Antonio Sanchez shares his take on this year’s event.
Blog
89% of Security Awareness Programs Are Focused on Social Engineering in 2024
By Antonio Sanchez on Thu, 08/15/2024
Cybersecurity experts from over 70 countries share their insights, candor, and challenges when it comes to raising the level of cybersecurity awareness in their organizations. Learn how Fortra’s Terranova Security can help.
Blog
Report Reveals Highest Cost of Data Breach Spike Since Pandemic
By Antonio Sanchez on Thu, 08/08/2024
IBM recently released their 2024 Cost of a Data Breach Report, highlighting some of the surprising cost increases and the reasons behind them.
Blog
Understanding Ransomware: How to Protect Against Ransomware
By Antonio Sanchez on Wed, 07/31/2024
You don’t know you’ve experienced a ransomware attack until you’ve been delivered the note. Understanding more about the ransomware process can help you stop the attack in the act before it escalates that far.
Blog
Protecting Your Digital Assets Against AI Cybercrime
By Bob Erdman on Wed, 07/31/2024
Cybersecurity experts offer insights into safeguarding digital assets and protection strategies. Explore the emerging role of AI in enhancing cybersecurity efforts.
Blog
What Is Vulnerability Management? Process & Use Cases
By Antonio Sanchez on Tue, 07/23/2024
Recent years have seen confusion around how to define vulnerability management. In this blog, security expert Antonio Sanchez sets the record straight, exploring the technology’s process and use cases.
Blog
RPA Implementation Guide
Tue, 07/23/2024
Robotic process automation (RPA) implementation is about more than just finding a software tool. RPA can transform your business by simplifying the tedious, repetitive processes holding you back, but to do so, you need a proper RPA implementation strategy.Companies want to embrace the transformative technology but struggle with where to start, what processes to automate, and how to measure the...
Blog
How to Automate Login to a Website and Download a File
Mon, 07/22/2024
If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
Blog
White House Tells All: 11 Major Government Breaches Last Year
By Antonio Sanchez on Fri, 07/12/2024
A recent report released by the White House revealed the circumstances, tactics, and results of the 11 cybersecurity incidents determined by agencies to meet the threshold for “major incidents” in the 2023 fiscal year. See the pitfalls and spot the similarities.
Blog
3 Key Takeaways from AWS re:Inforce 2024
By Mike Reed on Thu, 07/11/2024
Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog
Four Key Cybersecurity Highlights from Infosecurity Europe
By Steve Audsley on Thu, 06/27/2024
Infosecurity Europe 2024 saw a tightened focus on this year’s real security agenda: a holistic approach to data protection, scrutiny on the supply chain, and the ever-wary eye toward AI and its many uses. Fortra’s Steve Audsley, EMEA Solution Engineering Manager for Data Protection, shares his experience.