News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Datasheet
When to Use Robot HA, PowerHA, or Both
Discover the relationship between Fortra and IBM regarding Robot HA and PowerHA as well as when it is advantageous to use each one or both.
Blog
The State of Cybersecurity in Healthcare
By Antonio Sanchez on Tue, 02/20/2024
Healthcare is one of the most targeted industries for cyberattacks today. Find out what makes it so vulnerable and how Fortra’s portfolio of solutions come together to provide layered defense for the industry.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Blog
Vendor Consolidation: Why the IT Mindset Has Shifted, and How We Got Here
By Antonio Sanchez on Thu, 02/15/2024
Today’s security status quo isn’t working, and companies are plagued with overlapping vendors. Find out why quality beats quantity when it comes to making your vendor selections.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.
News Article
TechNational: How Can Companies Use AI in the Workplace?
By Donnie MacColl on Mon, 02/12/2024
Donnie MacColl spoke to TechNational about how organizations can safely integrate AI into business processes to strengthen cyber defenses.
On-Demand Webinar
DB2 Web Query Is Unsupported. Now What?
Using an outdated business intelligence solutions like Query/400 or an unsupported product like Db2 Web Query for i can put limitations on your data. Watch this video to learn how you can unlock your data’s full potential by using Sequel.
Product Video
How to Simplify IFS Journaling with Robot HA
Tue, 02/06/2024
Watch this demonstration of how you can simplify your IFS journaling using Robot HA.
Blog
What We Learned in Our Inaugural State of Cybersecurity Survey
By Antonio Sanchez on Tue, 01/23/2024
Security leaders around the world are dealing with the same challenges: hyperconnected environments, hyperdistributed workforces, and the shifting application of zero trust in an evolving digital landscape. Find out how they are navigating the changes in our first-ever State of Cybersecurity Survey results.
On-Demand Webinar
Ask the Sequel Experts: 2024
Watch this webinar for insight from our knowledgeable Sequel support team and to hear their answers to some of the most frequently asked questions from customers.
News Article
FedTech Magazine: How CMMC 2.0 Differs from the Original
By Antonio Sanchez on Tue, 01/16/2024
Antonio Sanchez spoke to FedTech Magazine about the notable updates in Cybersecurity Maturity Model Certification 2.0 compared to the original.
News Article
Techopedia: Why Deepfake Technology is Both a Strength and Danger for Organizations
Tue, 01/16/2024
The dangerous side of deepfakes is exposed in this Techopedia article. Theo Zafirakos shares his tips on how to spot them and avoid falling victim to AI-generated fraud. Learn more below.
Blog
CMMC 2.0 Is Almost Here. Can You Meet the Deadline?
By Antonio Sanchez on Wed, 01/10/2024
By 2025, government contractors who don’t meet new CMMC 2.0 requirements will no longer be eligible to be awarded contracts by the DoD. Learn what you can do to be ready – when others aren’t.
Guide
What Is Zero Trust? Six Cybersecurity Pros Answer Your Questions
Is zero trust just a buzzword? Cut through the hype and see what top cybersecurity professionals have to say about zero trust today.