Press Release
Fortra’s Digital Defense Wins Infosec Innovators Award for Vulnerability Management
Fortra today announced that Digital Defense has been named “Editor’s Choice” for Vulnerability Management in Cyber Defense Magazine’s InfoSec Innovator Awards 2023.
Press Release
Fortra Introduces New Integrations for Offensive Security
Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Guide
2023 Pen Testing Report
Over the years, penetration testing has become an integral component in proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved...
Press Release
Ransomware Remains a Threat 30 Years On
At the ripe old age or 30, ransomware is nothing new. However, attack methods have evolved and so must our defenses.
Press Release
What Firms Should Know About A New Python Ransomware that Targets VMs
Sophos recently observed a new python-based ransomware attack. Mieng Lim joins the commentary in this CXO Today article.
Press Release
What can Organizations do to Reduce the Risk of Ransomware?
With the news that the Biden Administration is bringing together 30 countries to discuss and address the threat of ransomware later this month, Digital Defense provides insight on how organizations can reduce their risk in this IT Nerd guest blog.
Press Release
Creating a Culture of Security for Social Butterflies
Organizations today are challenged to find a balance between encouraging employees to use social media for business while staying mindful of the potential security threats.
Press Release
Identifying Threats in the Network with Digital Defense’s Frontline.Cloud Solution
The onset of the pandemic and subsequent boom in remote working forced many organizations to accelerate their digital transformation programs. But in the rush to migrate to the cloud and against a backdrop of evolving cyber threats, are organizations leaving themselves vulnerable to cyber-attacks?
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Press Release
Savvy Cyber Criminals Using Employees' Social Media Habits as a Weapon Against Companies
How do cyber criminals use the social media habits of employees to infiltrate organizations? Find out in this report.
Press Release
Despite the headlines, there's no need to feel hopeless about cybersecurity
What lessons are to be learned from the many cyber-attacks we hear about in the news? The advice from Mark Bell, Managing Director, Digital Defense by Fortra, is that companies shouldn’t lose hope.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Guide
The Importance of Automating Systems Management
Systems management is an absolute necessity to ensure that businesses survive and thrive. Read this guide to learn the top ten automation tips for peace of mind.
Guide
Why Should You Monitor IBM MQ?
IBM MQ is a middleware product that allows messages (think data or information) to be sent and received to and from similar or dissimilar platforms with guaranteed delivery. Read this guide to learn the value of monitoring IBM MQ.
Guide
Integrating IBM i Security Events into Your SIEM
This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
Guide
Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
Download this guide...
Guide
Ensuring IT Efficiencies Through Enterprise Process Automation
To effectively and rapidly enable and manage complex business processes, organizations must adopt a unified solution that directly integrates process automation with job scheduling.