Resources

Guide

2023 Gone Phishing Tournament Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog

How to Succeed at IBM i Security

Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Blog

What’s New on Release Day 2023.4

In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Video

Getting Started with IBM i Security: Malware/Ransomware

Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware. If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Live Event
May
27

What Makes Cobalt Strike an Essential Red Teaming Tool

Cobalt Strike is a mature offensive security tool used for post-exploitation scenarios and red team operations. Experienced security professionals use Cobalt Strike to emulate the techniques and tactics of an embedded threat actor and put an organization’s defenses to the test. Though Cobalt Strike is a well-established tool, its team of dedicated researchers and developers have continued to place...