Live Webinar
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Live Event
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
News Article
Dark Reading: Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
By Tyler Reguly on Fri, 03/15/2024
Tyler Reguly spoke with Dark Reading about Microsoft’s Patch Tuesday security update for March.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
News Article
PYMNTS: FBI Sounds Alarm on AI-Driven Infrastructure Hacking
By Antonio Sanchez on Thu, 03/14/2024
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
News Article
Digital IT News: 15 Security Predictions for 2024
By Eric George on Tue, 02/27/2024
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
Is the AS/400 Dead?
By Tom Huntington on Mon, 02/19/2024
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
News Article
Finance Derivative: GenAI in Cyber
By Donnie MacColl on Mon, 02/12/2024
In this Finance Derivative article, Donnie MacColl discusses how cybercriminals leverage GenAI to do more in less time and shares tips on utilizing AI to fight back.
News Article
TechNational: How Can Companies Use AI in the Workplace?
By Donnie MacColl on Mon, 02/12/2024
Donnie MacColl spoke to TechNational about how organizations can safely integrate AI into business processes to strengthen cyber defenses.
On-Demand Webinar
DB2 Web Query Is Unsupported. Now What?
Using an outdated business intelligence solutions like Query/400 or an unsupported product like Db2 Web Query for i can put limitations on your data. Watch this video to learn how you can unlock your data’s full potential by using Sequel.