Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
News Article
Enhancing Business Resilience & Combining Solutions to Maximize Email Protection
By Ravisha Chugh on Thu, 09/12/2024
Email is a leading gateway for cyberattacks, underscoring the need for businesses to prioritize strong email security. In VMblog, Ravisha Chugh emphasizes that to combat sophisticated threats like Business Email Compromise (BEC) and phishing.
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Security Configuration Management
Security configuration management (SCM) is essential for the success of an organization’s overall security posture. This integral function of a holistic cybersecurity program targets the configurations of elements in the IT environment such as operating systems, applications, network devices, cloud assets, databases, servers, directory services, POS terminals, and workstations. Configuration...
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
News Article
IT Security Wire: Role of Cybersecurity Tools in Email Protection
Thu, 08/01/2024
Cary Hudgins and Mike Jones recently joined the IT Security Wire podcast to dive into the vital role of email protection in business resilience. Since emails are often the first target for cyberattacks, they discussed cutting-edge solutions and emphasized the need for integrating robust email security with your operating platforms.
Live Event
Sep
24
All day
Live Event
10:00 - 11:00am CDT
John Salmi
News Article
TheMilSource: Where Are We on the US TikTok Ban?
By Antonio Sanchez on Tue, 06/11/2024
Earlier this year, the US President signed a law that would ban TikTok unless its China-based parent company relinquishes its stake. In his discussion with TheMilSource, Antonio Sanchez shared his take on whether ByteDance would sell its stake.
Blog
The Top 5 Benefits of Remote Network Monitoring
By Kevin Jackson on Mon, 06/10/2024
If your network equipment is located in multiple locations, or your IT team wants to monitor the network on-the-go, remote network monitoring can help.
Blog
What Is Network Monitoring?
By Kevin Jackson on Wed, 05/29/2024
Discover what network monitoring is, why you need it, and the most common tools you can use to monitor your network.
On-Demand Webinar
Elevating Cloud Security: MFT Best Practices & Insights
Wed, 05/22/2024
Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. GoAnywhere Managed File Transfer (MFT) solution provides the security and control needed to move data confidently between systems, locations, users, and trading partners.In this webinar, we will delve into the design and architecture...
Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
How to Get the Most Out of Cybersecurity Best Practice FrameworksFrameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your...
News Article
InformationWeek: What the American Privacy Rights Act Could Mean for Data Privacy
By Antonio Sanchez on Fri, 04/26/2024
How could the American Privacy Rights Act impact companies and consumers? In his discussion with InformationWeek, Antonio Sanchez shared his observations about the new draft legislation.
News Article
CyberScoop: Congressional Privacy Bill Looks to Rein in Data Brokers
By Antonio Sanchez on Thu, 04/25/2024
Antonio Sanchez spoke with CyberScoop about the new congressional bill that aims to regulate data brokers.
News Article
MOTOR: EVs and Cybercrime
By Antonio Sanchez on Tue, 04/23/2024
What are the cybersecurity must-haves for electric vehicles? In this MOTOR Information Systems article, Antonio Sanchez discusses the EV market and potential cyber threats related to EVs.