Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware. If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Guide
Gaining Control of Financial Services Cybersecurity Regulations
Here’s your one-stop guide to cybersecurity regulations for the financial services industry — from the U.S. to the UAE. Find out how Fortra’s powerful portfolio can streamline financial service security compliance for your organization. Financial Cybersecurity Regulations to Know PCI DSS — Protecting the payment card industry against liability SWIFT — International electronic messaging standards...
News Article
CSO Online: Data Loss Prevention Vendors Tackle Gen AI Data Risks
By Wade Barisoff on Fri, 11/10/2023
How can businesses use Data Loss Prevention (DLP) tools to mitigate risks of generative AI? Wade Barisoff spoke to CSO Online about the generative AI-specific features of Fortra’s Digital Guardian DLP.
Press Release
Fortra Announces Replacement for Db2 Web Query
Fortra today announced the availability of its business intelligence solution Sequel as a secure and supported alternative for Db2 Web Query, an IBM i tool recently withdrawn from the market.
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen. Enter hyperautomation . What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy....
Article
Browser Automation: Automate Website Actions like Clicks or Data Extraction
Wed, 11/08/2023
With process automation revolutionizing the handling of routine tasks throughout organizations, many wonder if there are applications they may be missing. Automating browser tasks is one area that can simplify administrative processes and give time back to key employees.
News Article
Technology Record: Fortra’s Terranova Security Provides Accessible Cybersecurity Training for a Global Manufacturing Firm
Wed, 11/08/2023
Fortra’s Terranova Security helped a global manufacturing firm increase its international adoption rate of security training to 80 per cent.
Blog
What Is Cybersecurity Maturity?
By Antonio Sanchez on Mon, 11/06/2023
A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Guide
10 Common Security Misconfigurations and How to Fix Them
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible? Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application Security...
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
Press Release
Fortra’s Digital Defense Wins Infosec Innovators Award for Vulnerability Management
Fortra today announced that Digital Defense has been named “Editor’s Choice” for Vulnerability Management in Cyber Defense Magazine’s InfoSec Innovator Awards 2023.
Press Release
Fortra’s Digital Guardian Named Leader and Fast Mover in GigaOm Radar for Data Loss Prevention
Fortra today announced that for the third year running Digital Guardian was named leader and fast mover in the GigaOm Radar Report for Data Loss Prevention (DLP).
News Article
CyberWire Daily Podcast: CISOs' Challenges of Managing too Many Tools
By Antonio Sanchez on Thu, 11/02/2023
Managing a vast array of security tools can be problematic for CISOs and their security teams. Antonio Sanchez joined the CyberWire Podcast to discuss these complexities and ways CISOs can reduce this operational burden.
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Live Webinar
Join this live webinar to learn where the danger lies and how you can protect your systems. Power security expert Sandi Moore will discuss real-world examples of malware attacks on IBM i, and provide effective tactics for avoiding infections.
On-Demand Webinar
Make the Most of Showcase with Version 10
Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
On-Demand Webinar
How to Transfer Data Securely When Moving to The Cloud
By Ray Sutton
As more and more businesses move to a multi-cloud strategy, transferring data between cloud platforms has become a crucial aspect of the migration process, and due to the numbers of platforms and interfaces companies work with today, security, auditing, and maintainability of data transfers is growing ever more difficult. As a result of all the added complexity, operational expenses and security...
On-Demand Webinar
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.