Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware. If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Gaining Control of Financial Services Cybersecurity Regulations
Here’s your one-stop guide to cybersecurity regulations for the financial services industry — from the U.S. to the UAE. Find out how Fortra’s powerful portfolio can streamline financial service security compliance for your organization. Financial Cybersecurity Regulations to Know PCI DSS — Protecting the payment card industry against liability SWIFT — International electronic messaging standards...
CSO Online: Data Loss Prevention Vendors Tackle Gen AI Data Risks
By Wade Barisoff on Fri, 11/10/2023
How can businesses use Data Loss Prevention (DLP) tools to mitigate risks of generative AI? Wade Barisoff spoke to CSO Online about the generative AI-specific features of Fortra’s Digital Guardian DLP.
Fortra Announces Replacement for Db2 Web Query
Fortra today announced the availability of its business intelligence solution Sequel as a secure and supported alternative for Db2 Web Query, an IBM i tool recently withdrawn from the market.
What is Hyperautomation?
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen. Enter hyperautomation . What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy....
Browser Automation: Automate Website Actions like Clicks or Data Extraction
With process automation revolutionizing the handling of routine tasks throughout organizations, many wonder if there are applications they may be missing. Automating browser tasks is one area that can simplify administrative processes and give time back to key employees.
Technology Record: Fortra’s Terranova Security Provides Accessible Cybersecurity Training for a Global Manufacturing Firm
Fortra’s Terranova Security helped a global manufacturing firm increase its international adoption rate of security training to 80 per cent.
What Is Cybersecurity Maturity?
By Antonio Sanchez on Mon, 11/06/2023
A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
10 Common Security Misconfigurations and How to Fix Them
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible? Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application Security...
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
Fortra’s Digital Defense Wins Infosec Innovators Award for Vulnerability Management
Fortra today announced that Digital Defense has been named “Editor’s Choice” for Vulnerability Management in Cyber Defense Magazine’s InfoSec Innovator Awards 2023.
Fortra’s Digital Guardian Named Leader and Fast Mover in GigaOm Radar for Data Loss Prevention
Fortra today announced that for the third year running Digital Guardian was named leader and fast mover in the GigaOm Radar Report for Data Loss Prevention (DLP).
CyberWire Daily Podcast: CISOs' Challenges of Managing too Many Tools
By Antonio Sanchez on Thu, 11/02/2023
Managing a vast array of security tools can be problematic for CISOs and their security teams. Antonio Sanchez joined the CyberWire Podcast to discuss these complexities and ways CISOs can reduce this operational burden.
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Make the Most of Showcase with Version 10
Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
How to Transfer Data Securely When Moving to The Cloud
By Ray Sutton
There are many protocols and methods to transfer data with customers and trading partners, all with varying benefits and drawbacks. Cloud platforms offer native tools to transfer data, but they are not interoperable with other cloud uses and configurations. This results in companies having disparate methods of sharing data which can become confusing, ineffective to manage, and hard to keep secure...
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.