Video
IBM's Steve Will Talks IBM i
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The topics...
Demo
Discover Fast and Efficient Forms Creation with iForms
Schedule a demo to discover the simplicity that iForms brings to digital document creation and processing.
News Article
TechNewsWorld: Experts Advise Caution Before Scanning QR Codes
By Dr. Steve Jeffery on Wed, 12/27/2023
QR code phishing or quishing attacks keep rising. Steve Jeffery spoke to TechNewsWorld about how threat actors use QR codes to bypass existing security systems.
News Article
Help Net Security: Exploring the Impact of Generative AI in the Presidential Election
Mon, 12/25/2023
2024 is a presidential election year in the U.S. and Ryan Maltzen, Cybersecurity Architect at Fortra, predicts an increase in attempts to influence votes through propaganda and social media campaigns, aided by the use of generative AI.
Blog
Google and Yahoo Take Stance on Email Authentication
Mon, 12/18/2023
Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. Discover what these requirements mean for your organization, the importance of having Domain-based Message Authentication, Reporting & Conformance (DMARC) in place, and how Fortra can help.
...
News Article
VM Blog: Braving the Digital Risk & Email Security Landscape
By Eric George on Fri, 12/15/2023
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
News Article
Consumer Affairs: QR Code Scams Are About to Reach Dangerous Levels
By John Wilson on Wed, 12/13/2023
John Wilson spoke to Consumer Affairs about the rising threats of QR code scams and discussed cybercriminals' most common tactics.
News Article
TechChannel: Rising Stars Roundtable featuring Megan Olson
Fri, 12/01/2023
TechChannel Rising Star recipient, Megan Olson took part in a roundtable discussion to share her experience as a newcomer to the IBM i industry.
Blog
Common Email Threats and How to Combat Them
By Antonio Sanchez on Wed, 11/29/2023
We let email threats slip by us every day. Discover what popular ploys your team might be missing and how Fortra’s advanced security solutions can help.
News Article
Hacking Humans: Unmasking the Deceptive
By John Wilson on Thu, 11/23/2023
What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.
News Article
Business Reporter: Five CEO Scams to Watch Out For
By John Wilson on Thu, 11/23/2023
What are the most common CEO fraud scams? In this Business Reporter article, John Wilson discusses the different schemes threat actors use.
On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
Blog
What’s New on Release Day 2023.4
Mon, 11/20/2023
In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
On-Demand Webinar
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
Guide
Download the "Webdocs Accounts Payable Automation Guide"
Learn About the Inefficiencies of Manual Accounts Payable (AP) Processing and How Webdocs for AP Eliminates Them
Labor expenses typically consume 62% of total accounts payable costs. In other words, AP processes are intensive and inefficient when performed manually.
Webdocs for AP's automation capabilities pave the way for user and departmental...
News Article
Cyber Security Intelligence: Understanding the Threat of QR Codes & Quishing
By Dr. Steve Jeffery on Mon, 10/23/2023
Many organizations are concerned about QR code phishing or quishing because it can bypass existing security measures, making recipient awareness the key to protection. Steve Jeffery spoke to Cyber Security Intelligence about the threats of quishing and how to prevent them.