Blog
Reflections on Day One of Infosecurity Europe 2023
By Josh Davies on Thu, 06/22/2023
Josh Davies, Principal Technical Manager at Fortra, reflects on everything he’s learned at day one of Infosecurity Europe 2023.
Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals...
On-Demand Webinar
IBM i Capacity Planning – Cloud, On-Prem, or Hybrid?
By Randy Watson
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Blog
Fostering a Top-Notch Customer Experience
Tue, 06/20/2023
As VP of Customer Operations, Amy Vogsland is all about customer experience. She leads a global department of 100 people who have exquisite attention to detail on all matters related to accounts, renewals, invoicing, and licensing.
Blog
Low Code vs. No Code Automation
By EJ Stanley on Wed, 06/14/2023
All automation tools are not created equal. Some require great technical skills to build and manage automation, leaving many business users unable to reap the benefits of this advanced technology. However, there are tools and solutions that enable anybody to set up automated workflows that boost productivity and save time. These no-code and low-code tools bring automation to everyone—no matter...
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
The Benefits of Automating IBM i Spool File Conversion and Delivery
By Greg J. Schmidt on Wed, 06/14/2023
Discover how automating your IBM i spool file management and delivery can make your data more accessible to users and easier to deliver for administrators.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%. Every quarter, PhishLabs...
Blog
The Roadmap to a Cyber Resilient Manufacturing Sector
By Antonio Sanchez on Thu, 06/01/2023
Manufacturing has benefited from digitalization, but with increased digital footprints comes the increased risks of cyberattacks.
On-Demand Webinar
Put IBM i Security on the Offense with Pen Testing
By Amy Williams
Join IBM i security expert Amy Williams to learn how you can strengthen your organization’s IBM i security with penetration testing.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe . Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
On-Demand Webinar
The Foundation of IBM i Security Defense
By Sandi Moore
At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
Blog
Four RSA Conference 2023 Takeaways from an Industry Veteran
Thu, 05/18/2023
I’ve attended RSA Conference for years. The event is always special, but this year was momentous because it was our first time exhibiting as Fortra.
On-Demand Webinar
Overcome BI Obstacles with Sequel's Viewpoint Scripts
Viewpoint Scripts are one of the most versatile tools in your Sequel toolbox. Watch as business intelligence expert Brandy Lulling demonstrates how and when to use them.
On-Demand Webinar
Discover Easy and Affordable High Availability
Watch as our IBM i experts showcase how easy it is to navigate Robot HA, the simplicity it brings to creating new rules, and why it's so affordable.
Blog
Key Insights for Zero Trust in 2023
By Antonio Sanchez on Mon, 05/08/2023
With the release of the 2023 Zero Trust Security Report, it’s a good time to reflect on the seismic shifts that have happened in the industry regarding network security. Discover key insights and impacts of Zero Trust in 2023.
Blog
The Advantages of Cybersecurity Vendor Consolidation
Thu, 05/04/2023
First there was the boom – now there’s the bust. Organizations that invested in myriad new solutions to handle the complexity of myriad security problems now have a different problem on their hands – how do you handle all of the vendors? Companies are finding there’s a different kind of noise when too many providers are in the mix, and they’re looking to cut back. They still need the effectiveness...
Blog
Security Awareness: The Groundwork of Cybersecurity Culture
Wed, 05/03/2023
It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not. Criminal hackers go after the low hanging fruit and try the easy road before...