The U.S. House of Representatives passed a bill that would ban TikTok unless its China-based parent company relinquishes its stake. Antonio Sanchez spoke with The Last Watchdog and shared his observations.
The recent US Executive Order promises progress in privacy protection. In this Diginomica article, Wade Barisoff shares his observations and discusses how this EO can help protect sensitive personal data.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
Session Details
Security technology adoption is going through a paradigm shift. The wide range of nonintegrated products from a variety of vendors simply are not providing the outcomes security teams expect from their investments. Enter: Fortra, a cloud-native, multi-vector cyber defense platform that changes the game, combining best-of-breed solutions into a unified security experience.
What...
When is the right time to rely on an Option 21 save and when should I turn to an enterprise-class solution like BRMS or Robot Save? Read on to find out.
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Our experts developed the following best practices for easing automation implementation and advancing automated operations over the course of 30 years of working to help businesses make their processes more efficient. Let the countdown begin!
Healthcare is one of the most targeted industries for cyberattacks today. Find out what makes it so vulnerable and how Fortra’s portfolio of solutions come together to provide layered defense for the industry.
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.