News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
News Article
Technology Record Winter 2023 Issue: Fight Phishing With a Simulation Solution
By Mike Devine on Fri, 12/22/2023
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
News Article
Comparitech: The Best Data Protection Training Tools for Employees
Wed, 12/13/2023
Fortra’s Terranova Security was included in Comparitech’s list of the best data protection training tools for employees.
News Article
Technology Record: How to Guard Against the Dangers of AI
Thu, 11/23/2023
How can organizations stay safe in the age of AI? In this Technology Record article, Theo Zafirakos discusses the dangers of AI and provides expert insights on mitigating those risks.
News Article
Technology Record: Fortra’s Terranova Security Provides Accessible Cybersecurity Training for a Global Manufacturing Firm
Wed, 11/08/2023
Fortra’s Terranova Security helped a global manufacturing firm increase its international adoption rate of security training to 80 per cent.
News Article
eChannelNEWS Security Podcast: Building a Culture of Security Awareness with Fortra
Fri, 10/06/2023
Security is the responsibility of all employees, from the top down. Theo Zafirakos joined the eChannelNews Security Podcast to discuss how to best implement security awareness programs and the effective strategies for building a security-aware culture.
News Article
VM Blog: National Insider Threat Awareness Month 2023 Expert Roundup
By Wade Barisoff on Fri, 09/22/2023
Nowadays, insider threats have become a critical concern for organizations. In the scope of National Insider Threat Awareness Month, Wade Barisoff spoke with VM Blog about the importance of insider threat awareness, and shared valuable insights on how organizations can address these threats.
News Article
Security Weekly: Email Impersonation Threats Reaching Corporate Inboxes Hit An All-Time High
By John Wilson on Mon, 08/21/2023
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
Article
Remember the IFS!
By Robin Tatam on Thu, 06/27/2019
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article
Protect the IBM i Command Line with Powertech Command Security for IBM i
By Robin Tatam on Fri, 03/24/2017
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.