-
Alan Jordan |
Greg J. Schmidt
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Product Video
How to Improve Your IFS Management with Robot Space
Tue, 02/06/2024
Watch this video to discover how you can improve your IFS management using Robot Space.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To?
Mon, 03/27/2023
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
News Article
e-ChannelNews Interview with Mark Bell: Core Security Releases New Ransomware Simulator
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.
Learn how a proactive cybersecurity program can be a game changer for an organisation's success through...
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
Article
Space Oddities—What’s in Your IFS?
By Chuck Losinski on Wed, 01/19/2022
Read this article to learn what might be taking up valuable disk space in the IFS and what you can do to control it.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.