Resources

News Article

Hacking Humans: Unmasking the Deceptive

What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
On-Demand Webinar

Make the Most of Showcase with Version 10

Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
On-Demand Webinar

Repository Mode: Sequel’s Hidden Gem

Watch our webinar on Sequel's second interface: Repository Mode. Learn how Repository Mode makes saving your Sequel objects easier with security management, Active Directory authentication, and IFS integration.
Press Release

Fortra Introduces New Integrations for Offensive Security

Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
News Article

Digital Journal: FBI’s Warning Around Sextortion Schemes

The FBI has issued a warning about the use of "deepfakes" in a new wave of sextortion schemes. In his interview with Digital Journal, John Wilson examines the techniques used and provides valuable tips to help protect children from such scams.
On-Demand Webinar

Help! I inherited an IBM i!

If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.