Demo
Want to see what's new in Automate 24.2?
Watch an on-demand demo of the latest Automate release now! Get instant access to an on-demand demo showcasing the latest and greatest features in Automate. Automate 24.2 is here! What you'll see in our latest version:Agent NotificationsDynamic 365 ActionEvaluateExpression(Expression) Extended FunctionWeb Browser Action EnhancementAnd more! ...
News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Blog
The State of Cybersecurity in Healthcare
By Antonio Sanchez on Tue, 02/20/2024
Healthcare is one of the most targeted industries for cyberattacks today. Find out what makes it so vulnerable and how Fortra’s portfolio of solutions come together to provide layered defense for the industry.
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
News Article
CSO Online: 8 Things That Should Be in a Company BEC Policy Document
By Chris Reffkin on Tue, 02/20/2024
Organizations should consider creating business email compromise policies to minimize risks as BEC attacks increase and become more sophisticated. Chris Reffkin spoke to CSO Online about the best practices of a BEC policy guide.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Blog
Vendor Consolidation: Why the IT Mindset Has Shifted, and How We Got Here
By Antonio Sanchez on Thu, 02/15/2024
Today’s security status quo isn’t working, and companies are plagued with overlapping vendors. Find out why quality beats quantity when it comes to making your vendor selections.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.
News Article
TechNational: How Can Companies Use AI in the Workplace?
By Donnie MacColl on Mon, 02/12/2024
Donnie MacColl spoke to TechNational about how organizations can safely integrate AI into business processes to strengthen cyber defenses.
Blog
What We Learned in Our Inaugural State of Cybersecurity Survey
By Antonio Sanchez on Tue, 01/23/2024
Security leaders around the world are dealing with the same challenges: hyperconnected environments, hyperdistributed workforces, and the shifting application of zero trust in an evolving digital landscape. Find out how they are navigating the changes in our first-ever State of Cybersecurity Survey results.
News Article
FedTech Magazine: How CMMC 2.0 Differs from the Original
By Antonio Sanchez on Tue, 01/16/2024
Antonio Sanchez spoke to FedTech Magazine about the notable updates in Cybersecurity Maturity Model Certification 2.0 compared to the original.
News Article
Techopedia: Why Deepfake Technology is Both a Strength and Danger for Organizations
Tue, 01/16/2024
The dangerous side of deepfakes is exposed in this Techopedia article. Theo Zafirakos shares his tips on how to spot them and avoid falling victim to AI-generated fraud. Learn more below.
Blog
CMMC 2.0 Is Almost Here. Can You Meet the Deadline?
By Antonio Sanchez on Wed, 01/10/2024
By 2025, government contractors who don’t meet new CMMC 2.0 requirements will no longer be eligible to be awarded contracts by the DoD. Learn what you can do to be ready – when others aren’t.
Guide
What Is Zero Trust? Six Cybersecurity Pros Answer Your Questions
Is zero trust just a buzzword? Cut through the hype and see what top cybersecurity professionals have to say about zero trust today.
Blog
2024 Predictions from Fortra and Forrester: Threat Intelligence, Collaboration, and More
By Antonio Sanchez on Tue, 01/09/2024
A few years ago, companies rushed to digitize. Now, they rush to secure in a world where the rules have changed. Top security experts from Fortra and Forrester come together to predict where the industry will go from here and what to focus on in 2024.
Guide
The Ultimate Guide to Insider Threats
Today’s complex environments give malicious insiders greater access than ever. Learn the three types of insider threats, how to prevent them using emerging techniques, and how to stop permission drift before it starts.
Video
IBM's Steve Will Talks IBM i
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The topics...
News Article
TechNewsWorld: Experts Advise Caution Before Scanning QR Codes
By Dr. Steve Jeffery on Wed, 12/27/2023
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.