Resources

News Article

Hacking Humans: Unmasking the Deceptive

What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
On-Demand Webinar

How to Avoid the Biggest Mistakes in IBM i Security

Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
On-Demand Webinar

Help! I inherited an IBM i!

If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
On-Demand Webinar

The Foundation of IBM i Security Defense

At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
On-Demand Webinar

Expert Advice on IBM i in the Cloud

Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.