News Article
The Futurum Group: Black Hat 2024 Reflections: Security Challenges Demand Rethink on Tools and Processes
Mon, 09/23/2024
The Futurum Group’s analysis of Black Hat 2024 highlights how the growing complexity of cybersecurity tools is driving the need for streamlined platforms. Fortra is mentioned alongside other leading vendors for offering solutions that reduce tool sprawl, cut costs, and close security gaps.Originally published by The Futurum Group.Excerpt: "The cybersecurity market has long been driven by user...
News Article
IT Brew: More Than Half of IT Professionals Aren’t Familiar With the Shared Responsibility Model
By Nick Franklin on Fri, 09/20/2024
A recent IT Brew article highlights a major cloud security gap: only 49% of surveyed IT and cybersecurity professionals are familiar with the "shared responsibility model," which defines the division of security duties between cloud providers and customers. Nick Franklin emphasized the common misunderstanding around these responsibilities, urging customers to ask their providers directly about what they are responsible for.
News Article
Reworked: How Security Service Edge Applications Enable Hybrid and Remote Work
By Wade Barisoff on Fri, 09/20/2024
Security Service Edge (SSE) applications are becoming essential for securing hybrid and remote work environments. In a recent article in Reworked, Wade Barisoff highlights which organizations are best suited for SSEs and how these solutions can enhance security effectively.
News Article
Forbes: Critical Windows 10 Update Security Glitch Fix Confirmed By Microsoft
By Tyler Reguly on Thu, 09/19/2024
Microsoft has identified and confirmed a fix for a critical security vulnerability introduced by a recent Windows 10 update.
News Article
DZone: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
By Antonio Sanchez on Fri, 09/13/2024
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
News Article
Enhancing Business Resilience & Combining Solutions to Maximize Email Protection
By Ravisha Chugh on Thu, 09/12/2024
Email is a leading gateway for cyberattacks, underscoring the need for businesses to prioritize strong email security. In VMblog, Ravisha Chugh emphasizes that to combat sophisticated threats like Business Email Compromise (BEC) and phishing.
Live Webinar
All day
Antonio Sanchez |
Josh Davies
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
News Article
Amazon Press Center: AWS Launches Global Passport Program to Accelerate Software Companies’ Growth and International Expansion
Fri, 09/06/2024
Amazon Web Services (AWS) announced the launch of its AWS Global Passport Program to help independent software vendor customers grow their businesses internationally. Fortra is one of the first participants in the program.
Guide
Avoid These Common Ransomware Prevention Oversights
Most breaches and data losses are caused by simple "honest" mistakes that inadvertently create security weaknesses for attackers to target. In fact 68% of data breaches originate from some type of non-malicious human element*. When it comes to ransomware prevention, if you focus too intently on your defensive cybersecurity tactics, you may be overlooking some fundamental security measures, like...
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
News Article
Hosting Advice: Leading Cybersecurity Provider Empowers Businesses to Bolster Infrastructure Protection
By Rohit Dhamankar on Fri, 08/30/2024
Hackers are constantly changing their tactics and using new technologies to infiltrate systems, leaving companies in a constant battle to protect their security. In a recent Hosting Advice article, Rohit Dhamankar dives into how cyber threats keep evolving and why businesses need to tweak their security game.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Blog
The Password Atmosphere – Problem, or Progress?
By Lisa Lombardo on Mon, 08/26/2024
Password security has evolved from simple physical protections to complex, multi-factor authentication systems. Experts suggest that while traditional passwords are becoming outdated, combining them with new technologies like biometrics and passkeys offers stronger security. Future trends point towards more user-friendly yet robust methods to safeguard digital access.
Blog
What Is the NIST Risk Management Framework (RMF)?
By Antonio Sanchez on Mon, 08/26/2024
The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
RPG Toolbox Downloads
Pre-Installation NotesThe Toolbox software restores onto the IBM i as a Licensed Program named 4RPGBOX. After you restore this licensed program, the software will be contained in the library named RPGTOOLBOX.RequirementsTo install the Toolbox, the following requirements must be met:IBM i release 7.2 or greater installed on your IBM i.Your user id must have authority to the RSTLICPGM command.If you...
Guide
How Fortra Supports the MAS TRM Notice and Guidelines
Download this guide to learn how Fortra's solutions can help your organization comply with the MAS TRM notice and guidelines.
Blog
My Takeaways from Black Hat USA 2024
By Antonio Sanchez on Mon, 08/19/2024
The importance of resilience and business continuity dominated conversations at Black Hat USA 2024. In this blog, security expert Antonio Sanchez shares his take on this year’s event.
News Article
Forbes: New Windows 10 And 11 Blue Screen Of Death Warning Issued
By Ricardo Narvaja on Fri, 08/16/2024
Fortra recently uncovered a vulnerability in Windows that can cause a blue screen of death. Today, Fortra issued an advisory for Windows vulnerability CVE-2024-6768. Originally published in Forbes.Excerpt: “The potential problems include system instability and denial of service,” Ricardo Narvaja, principal exploit writer with security company Fortra, and the author of the report, said, “malicious...