Live Event
8:00 - 8:45am PDT
EJ Stanley
Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Blog
Comparing RPA Platforms: Fortra’s Automate vs. Microsoft’s Power Automate
By EJ Stanley on Tue, 08/20/2024
See a head-to-head matchup between RPA platforms—Fortra’s Automate vs. Microsoft’s Power Automate—and compare licensing, functionality, support, and more.
Datasheet
Fortra’s Email Security Bundles Datasheet
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
Datasheet
Tripwire Enterprise and IBM i
Many of the world's largest companies rely on IBM i operating on IBM Power Servers as their strategic platform for business-critical activities such as retail, distribution, logistics, banking, manufacturing planning, healthcare, insurance, hospitality management, government administration, and legal case management. Given the widespread use of the IBM i operating system, advanced cybersecurity...
News Article
Techopedia: FishXProxy: Dark Web’s Next-Gen ‘Ultimate Phishing Toolkit’ Alarms Experts
By Michael Tyler on Fri, 08/02/2024
In this Techopedia article, Michael Tyler discusses new phishing malware kit FishXProxy.
Blog
RPA Implementation Guide
Tue, 07/23/2024
Robotic process automation (RPA) implementation is about more than just finding a software tool. RPA can transform your business by simplifying the tedious, repetitive processes holding you back, but to do so, you need a proper RPA implementation strategy.Companies want to embrace the transformative technology but struggle with where to start, what processes to automate, and how to measure the...
Blog
3 Components of a Proactive Security Strategy
By Mieng Lim on Mon, 07/22/2024
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Article
Browser Automation: Automate Website Actions like Clicks or Data Extraction
Mon, 07/22/2024
With process automation revolutionizing the handling of routine tasks throughout organizations, many wonder if there are applications they may be missing. Automating browser tasks is one area that can simplify administrative processes and give time back to key employees.
Blog
How to Automate Login to a Website and Download a File
Mon, 07/22/2024
If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
Live Event
10:00 - 11:00am CDT
John Salmi
News Article
Cyber Defense Magazine: New Phishing Campaign Using AI Generated Emails, Human Live Chat to Target Social Media Business Accounts
By Michael Tyler on Fri, 06/28/2024
In this Cyber Defense Magazine article, Michael Tyler, Sr. Director of Security Operations at Fortra, discusses a sophisticated phishing campaign targeting Meta business accounts. He explains the tactics behind the campaign and shares tips to protect against it.
News Article
Best Life: How to Identify Phishing Emails
Fri, 06/14/2024
Struggling to identify phishing emails? Theo Zafirakos shared valuable tips on how to spot email scams and stay safe.
News Article
Healthcare IT News: HHS Offers $50M to Help Providers Patch Ransomware Vulnerabilities
By Tyler Reguly on Fri, 06/07/2024
Is AI enough to help organizations keep up with constantly changing vulnerabilities? Tyler Reguly spoke with Healthcare IT News and shared his take on it.
News Article
ComputerWeekly: Critical Sharepoint, Qakbot-Linked Flaws Focus of May Patch Tuesday
By Tyler Reguly on Fri, 06/07/2024
Tyler Reguly spoke with ComputerWeekly about the elevation of privilege (EoP) vulnerability in Windows DWM Core Library.