Join Kurt Thomas and George Hibler for a live webinar where they’ll discuss why implementing Zero Trust on the IBM i is important, what Zero Trust on the IBM i looks like and how to implement it.
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
As evidenced by XBash and Kodi add-on malware, the myth that Linux is immune to viruses could not be further from the truth. In reality, Linux is becoming a lucrative target.
Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
The Spectre and Meltdown vulnerabilities do affect Power Systems servers. Fortra security expert explains what we know so far and how you can stay up-to-date on patches released by IBM.
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Everyone’s aware of the dangers of *ALLOBJ, *SECADM, and *SPLCTL special authorities. But what about the rest? Fortra security expert explains the issues you should be aware of when assigning the other special authorities.
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).