On-Demand Webinar
IBM i Education: The Business Value of Modern Job Scheduling
Watch this webinar on the true business value of a modern IBM i scheduling solution and how it can be used to keep you current with the leading IT trends.
Product Video
Security Awareness Training Videos
Watch a sampling of Terranova Security's cyber security training video lessons. Experience the industry’s highest-quality security awareness training content.
Guide
The Cyber Security Hub
Access free security awareness training content on a variety of important topics, including phishing, social engineering, ransomware, passwords, and much more.
News Article
DZone: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
By Antonio Sanchez on Fri, 09/13/2024
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Live Webinar
10:00 - 10:45am CDT
Tom Huntington |
Chuck Losinski
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
On-Demand Webinar
BRMS Education Series: From Basic Setup to Advanced Features
Watch this webinar series from Sarah Jacob of Agile Technology and Fortra's Tom Huntington for education on BRMS basics and advanced tips.
News Article
The SupplyChainBrain Podcast: The Latest Plague: A Huge Increase in Supply Chain Cyberattacks
By Theo Zafirakos on Wed, 08/07/2024
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
Blog
Open-Source IT Tools: Advantages, Disadvantages, and How Halcyon Compares
By Mike Davison on Mon, 08/05/2024
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
News Article
Techopedia: FishXProxy: Dark Web’s Next-Gen ‘Ultimate Phishing Toolkit’ Alarms Experts
By Michael Tyler on Fri, 08/02/2024
In this Techopedia article, Michael Tyler discusses new phishing malware kit FishXProxy.
News Article
Manufacturing Business Technology: Security Breach Podcast
By Theo Zafirakos on Wed, 07/31/2024
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
News Article
Cyber Defense Magazine: New Phishing Campaign Using AI-Generated Emails
By Michael Tyler on Fri, 07/19/2024
A phishing campaign targets businesses to compromise Facebook and Instagram accounts with access to Meta Business Suite. In this Cyber Defense Magazine article, Michael Tyler discusses the tactics behind the campaign and shares tips to stay safe.
On-Demand Webinar
IBM i in 2024: From AS400 to AI
Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
Live Event
Sep
24
All day