-
Tyler Reguly
Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
-
Steven Sletten
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Blog
The Changing Role of Government in Cybersecurity
By Antonio Sanchez on Wed, 11/29/2023
Governments are responsible for carrying out their duties to defend the rights and safety of their citizens. Find out their role in the cyber landscape and how Fortra plays a part.
Guide
10 Common Security Misconfigurations and How to Fix Them
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible?
Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide...
Blog
Financial Services Cybersecurity: What You Need to Know
By Antonio Sanchez on Wed, 10/11/2023
Today’s financial threat landscape is evolving, and firms are facing record high risk. Learn what’s causing the uptick and which essential cybersecurity practices will ke.ep you safe
Blog
Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe
By Antonio Sanchez on Mon, 10/09/2023
In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your expectations and fortify your environment like never before with Fortra.
Guide
PCI DSS 4.0 Compliance: Tips to Avoid Last-Minute Panic
The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy.
This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated...
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
On-Demand Webinar
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
On-Demand Webinar
Fight Cyber Threats with IBM i Encryption
By Sandi Moore
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
Guide
A Guide to IBM i Message Management
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Blog
What Is NVMe?
By Randy Watson on Thu, 04/01/2021
NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Article
Be in Control of Your ERP
By Chuck Losinski on Wed, 03/31/2021
Many ERP packages have built-in schedulers. However, these schedulers are typically not flexible or robust enough to meet the needs of even the smallest data center.
Guide
Robot in Modern IBM i Environments
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Blog
Realize ROI with Robot
By Tom Huntington on Sun, 03/28/2021
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
On-Demand Webinar
5 Myths About Encryption on IBM i
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.