Resources

Guide

Brand Threats Masterclass

In 2024, organizations face growing brand protection challenges with online impersonation attacks targeting their assets through non-traditional means. These attacks are spanning channels not typically protected by corporate controls and leveraging AI to generate lures, making detection increasingly broad and mitigation nuanced. To better understand the top brand risks, Fortra held a roundtable...
Blog

How to Scrape Data from a Website (Tutorial)

Spending too much time going to websites and manually entering data into spreadsheets? While they may seem simple, these types of tasks eat up a great deal of time, and with manual data entry, are incredibly error prone. But with a web scraping tool, you can scrape data from a website, saving your team time and reducing errors. And with the right tool, you won’t need to write a single line of code...
Blog

RPA vs. API: Differences and Use Cases

At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
News Article

Hacking Humans: Unmasking the Deceptive

What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
On-Demand Webinar

After AI: Cyber Predictions for 2024

Watch this on-demand webinar to hear cybersecurity experts from Fortra and guest Principal Analyst Jess Burn, Forrester, make their predictions on what will shape the landscape next year and beyond.
Video

Getting Started with IBM i Security: Malware/Ransomware

Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware. If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...