Resources

Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog

The Password Atmosphere – Problem, or Progress?

Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
On-Demand Webinar

[WEBINAR] Nowhere Left to Hide: Exposing Financial Services Fraudsters Who Hide in Plain Sight

Session DetailsSecurity leaders of financial institutions have some of the most demanding job descriptions in the industry. Threat actors go where the money goes, and let’s just say that a certain industry has a giant sign hanging above it.As teams try to crack down on enterprise security, cybercriminals continue to attack on multiple fronts. With the complexity of the financial sector increasing...
On-Demand Webinar

IBM i in 2024: From AS400 to AI

Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
On-Demand Webinar

[WEBINAR] Fortra Proof of Concept

Session DetailsFortra takes being your cybersecurity ally seriously. That’s why we’ve been challenging the security status quo in 2024, and we’ve got the tangible results to prove it.We’re leaving our mark on the market with new extended detection and response capabilities, enhanced threat intelligence, BEC research, responsive development, strategic partnerships, and more!Watch this webinar as...
Blog

3 Key Takeaways from AWS re:Inforce 2024

Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog

Four Key Cybersecurity Highlights from Infosecurity Europe

Infosecurity Europe 2024 saw a tightened focus on this year’s real security agenda: a holistic approach to data protection, scrutiny on the supply chain, and the ever-wary eye toward AI and its many uses. Fortra’s Steve Audsley, EMEA Solution Engineering Manager for Data Protection, shares his experience.
Blog

Understanding The White House’s 2024 Cybersecurity Report

To protect against mounting threats to national security via nation-state cyberattacks, domestic ransomware attacks, and threats to critical infrastructure, The White House issued its 2023 National Cybersecurity Strategy. This recently released 2024 report reviews progress made towards achieving those outlined objectives.
On-Demand Webinar

IBM i Performance Week

Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!