Blog
Lean into Security: Take the Next Step toward Securing Your Organization
By Antonio Sanchez on Mon, 10/28/2024
Elevating your organization’s security maturity level requires a forward-leaning approach to cybersecurity leadership. This article discusses key security fundamentals, advanced strategies, and steps to assess and build a robust security maturity model that supports business goals.
Blog
Fortra Pledges to be Secure by Design
By Anthony Israel-Davis on Mon, 10/28/2024
Fortra recently signed CISA’s Secure by Design Pledge. Learn what this means to our customers regarding our approach to software development.
Live Webinar
8:00 - 8:45am PST
Scott Messick
On-Demand Webinar
IBM i Data from the Ground Up: Cybersecurity, Operations, Data Access and Management
Watch the recordings from Fortra's virtual event with COMMON, where our experts offered insight and examples of how organizations on IBM i can improve their security, operations, business intelligence, and document management strategy.
Live Webinar
12:00 - 12:45pm CST
Sandi Moore
Blog
Why We Can’t Take Supply Chain Attacks Seriously Enough
By Theo Zafirakos on Wed, 10/16/2024
Research suggests that 98% of organizations are currently doing business with a third party that’s been breached. Learn about the main types of supply chain attacks today and the simplest steps to stay safe.
News Article
National Cybersecurity Awareness Month 2024: Industry Experts Share Their Thoughts
By Antonio Sanchez on Wed, 10/16/2024
For National Cybersecurity Awareness Month 2024, Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra, contributed expert tips to VM Blog’s latest collection.
Live Event
All day
Bob Erdman |
Chris Reffkin |
John Wilson |
Theo Zafirakos
On-Demand Webinar
[WEBINAR] Bearing the Load: Managing Supply Chain Risk
By Josh Davies
Session DetailsThe risk you carry as an enterprise is no longer entirely in your control. Or is it?Join Fortra as we discuss one of the hottest topics in cybersecurity today: third-party risk. Partnering with outside organizations can be an instant liability, but in today’s vastly interconnected business economy, it's a necessary evil. Lengthened supply chains facilitate faster and cheaper...
Trial
Start a Surveyor/400 Trial
Surveyor/400 allows I.T. personnel and end-users to easily work with IBM i data, files, libraries, objects, and reports from within a graphical desktop interface. Powerful security and audit features are included in Surveyor/400 to provide complete control over user activity within the product.A wide variety of users can take advantage of the benefits of Surveyor/400. With its extensive built-in...
Trial
Start a Trial of RPG Toolbox
RPG Toolbox will modernize your RPG source code with the most up-to-date free form syntax available for your IBM i release. The conversions can be performed from IBM's RDi development environment, PDM or from SEU. The flexibility of the RPG Toolbox allows you to convert entire source members or just blocks of source code within a member.With RPG Toolbox, developers can watch how the old source...
News Article
CyberTech Insights: The Cybersecurity Gap: Why Even the Best-Trained Teams Still Vulnerable to Attacks
By John Grancarich on Mon, 10/07/2024
In a new article for CyberTech Insights, John Grancarich, Fortra's Chief Strategy Officer, explores why security awareness training matters more than ever. Drawing from personal experiences with cyber extortion and phishing, John highlights how continuous practice can better prepare us for real-world risks.Originally published in CyberTech Insights.Excerpt:“We’re not going to get any less busy, so...
Blog
Fortra Insights: Customer Cybersecurity Challenges and Plans for 2025
By Lisa Lombardo on Thu, 10/03/2024
Fortra’s cybersecurity experts share insights into their customers’ top concerns and strategies for 2025. This article uncovers how businesses prepare to navigate the evolving cybersecurity landscape, from static budgets to compliance pressures and modern threats.
Blog
Election Integrity at Risk: Safeguarding 2024’s Global Polls from Cyber Attacks
By Antonio Sanchez on Tue, 10/01/2024
As the world prepares for the 2024 election cycle, cybersecurity, disinformation, and AI-driven manipulation are emerging as major threats to democratic processes. From deepfakes to foreign influence campaigns, the risks to election integrity are growing. Individuals, businesses, and governments must unite to protect global elections from these evolving challenges.
Blog
Are Younger Generations Losing Faith in Cybersecurity? The Oh, Behave! Report Investigates
By Antonio Sanchez on Fri, 09/27/2024
Times have changed since the happy-go-lucky internet days of the dot-com boom. Find out just how much, what that means, and what cybersecurity practitioners can do about it.
Live Webinar
12:00 - 12:30pm EDT
Steve Sisk
Blog
3 Ways Malware Can Reach Your IFS
Tue, 09/24/2024
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
News Article
ITNerd: Fortra Discovers Sophisticated QR Code Phishing Campaign Targeting Office 365 Users
Tue, 09/24/2024
A sophisticated QR code phishing campaign targeting Office 365 users has been uncovered by Fortra, as detailed by ITNerd.