By 2025, government contractors who don’t meet new CMMC 2.0 requirements will no longer be eligible to be awarded contracts by the DoD. Learn what you can do to be ready – when others aren’t.
A few years ago, companies rushed to digitize. Now, they rush to secure in a world where the rules have changed. Top security experts from Fortra and Forrester come together to predict where the industry will go from here and what to focus on in 2024.
Today’s complex environments give malicious insiders greater access than ever. Learn the three types of insider threats, how to prevent them using emerging techniques, and how to stop permission drift before it starts.
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The topics...
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
What are the new AI security guidelines, and how will they reshape the landscape? In his Technology Dispatch article, Josh Davies discusses the Guidelines for Secure AI System Development and their impact on organizations that build or use AI.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
Airline customers need to be aware that their PII data could be for sale on the dark web. Nick Oram looks at how attackers use this data and provides tips on how to keep your data secure.
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
In 2024, organizations face growing brand protection challenges with online impersonation attacks targeting their assets through non-traditional means. These attacks are spanning channels not typically protected by corporate controls and leveraging AI to generate lures, making detection increasingly broad and mitigation nuanced.
To better understand the top brand risks, Fortra held a roundtable...