Resources

News Article

MOTOR: EVs and Cybercrime

What are the cybersecurity must-haves for electric vehicles? In this MOTOR Information Systems article, Antonio Sanchez discusses the EV market and potential cyber threats related to EVs.
News Article

IT Nerd: American Privacy Rights Act Unveiled

The recently unveiled American Privacy Rights Act is a significant step toward establishing a federal data privacy standard in the U.S. Antonio Sanchez spoke with IT Nerd and shared his observations about the legislation.
Live Webinar
May
14

Why Don't Companies Role Swap?

Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Guide

2023 Gone Phishing Tournament Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Guide

Going Beyond the GUI

Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog

Is the AS/400 Dead?

Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.