On-Demand Webinar
IBM i Education: The Business Value of Modern Job Scheduling
Watch this webinar on the true business value of a modern IBM i scheduling solution and how it can be used to keep you current with the leading IT trends.
Live Webinar
10:00 - 10:45am CDT
Tom Huntington |
Chuck Losinski
Security Configuration Management
Security configuration management (SCM) is essential for the success of an organization’s overall security posture. This integral function of a holistic cybersecurity program targets the configurations of elements in the IT environment such as operating systems, applications, network devices, cloud assets, databases, servers, directory services, POS terminals, and workstations. Configuration...
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Guide
How Fortra Supports the MAS TRM Notice and Guidelines
Download this guide to learn how Fortra's solutions can help your organization comply with the MAS TRM notice and guidelines.
On-Demand Webinar
BRMS Education Series: From Basic Setup to Advanced Features
Watch this webinar series from Sarah Jacob of Agile Technology and Fortra's Tom Huntington for education on BRMS basics and advanced tips.
Datasheet
Fortra’s Email Security Bundles Datasheet
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
Datasheet
Tripwire Enterprise and IBM i
Many of the world's largest companies rely on IBM i operating on IBM Power Servers as their strategic platform for business-critical activities such as retail, distribution, logistics, banking, manufacturing planning, healthcare, insurance, hospitality management, government administration, and legal case management. Given the widespread use of the IBM i operating system, advanced cybersecurity...
News Article
Techopedia: FishXProxy: Dark Web’s Next-Gen ‘Ultimate Phishing Toolkit’ Alarms Experts
By Michael Tyler on Fri, 08/02/2024
In this Techopedia article, Michael Tyler discusses new phishing malware kit FishXProxy.
On-Demand Webinar
IBM i in 2024: From AS400 to AI
Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
Live Event
10:00 - 11:00am CDT
John Salmi
News Article
Cyber Defense Magazine: New Phishing Campaign Using AI Generated Emails, Human Live Chat to Target Social Media Business Accounts
By Michael Tyler on Fri, 06/28/2024
In this Cyber Defense Magazine article, Michael Tyler, Sr. Director of Security Operations at Fortra, discusses a sophisticated phishing campaign targeting Meta business accounts. He explains the tactics behind the campaign and shares tips to protect against it.
News Article
Best Life: How to Identify Phishing Emails
Fri, 06/14/2024
Struggling to identify phishing emails? Theo Zafirakos shared valuable tips on how to spot email scams and stay safe.
On-Demand Webinar
IBM i Performance Week
Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!
News Article
Healthcare IT News: HHS Offers $50M to Help Providers Patch Ransomware Vulnerabilities
By Tyler Reguly on Fri, 06/07/2024
Is AI enough to help organizations keep up with constantly changing vulnerabilities? Tyler Reguly spoke with Healthcare IT News and shared his take on it.