Blog
Zero Trust 101: A Guide to Zero Trust Security
Fri, 08/04/2023
Discover the benefits of removing implicit trust and enable your organization to continuously authenticate and authorize data access from anyone, anywhere, always.
Blog
INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks
Wed, 08/02/2023
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog
Cybersecurity Threats Facing Energy and Utilities: What You Need to Know
Tue, 08/01/2023
Utility sectors have a unique set of challenges that make securing them a job for the experts. That’s where Fortra steps in.
Blog
Inside the fight against hackers who disrupted hospitals and jeopardized lives
By Vanessa Ho on Mon, 07/31/2023
Blog
A First-Hand Account of How Email Security Has Changed – And Where It Is Today
By Antonio Sanchez on Fri, 07/28/2023
A 20-year veteran of the industry shares his first-hand account of how email – and email security – has changed over the years and where it is now.
Blog
Evolve Your Security Strategy to Prepare for DORA
By Antonio Sanchez on Thu, 07/27/2023
Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog
Top 10 Takeaways: Verizon 2023 Data Breach Investigations Report
By Antonio Sanchez on Thu, 07/27/2023
We’ve summarized the Verizon 2023 DBIR into top points. Find out which attack methods hackers leveraged to drive breaches and how Fortra can help you stay safe.
On-Demand Webinar
MFT in 45 minutes
By Ray Sutton
Managed File Transfer (MFT) technology enables modern businesses to secure and automate file sharing, collaborate with external parties and seamlessly integrate with cloud environments.
Discover the power of Fortra’s GoAnywhere, chosen as the best MFT solution in the market by users, in this video. In just 45 minutes, you'll gain insights...
Product Video
Robot Monitor Product Overview and Demonstration
Wed, 07/26/2023
Watch this recording to get an overview of Robot Monitor’s key features – including SQL monitoring, customization to workloads, and the ability to create your own SQL-based monitor – as well as an inside look at how to operate Robot Monitor and customize its outputs to your liking.
On-Demand Webinar
Modernize Your IBM i Spooled Files and PC Reports Management
The traditional style of data and report management isn’t fit for our modern, fast-paced business environment. Watch this recorded session to discover Webdocs and how you can use it to modernize the way you manage your spool files and PC-based reports.
Blog
Understanding CVE 2023-30990: The Vulnerability Exploiting the DDM
By Amneris Teruel on Tue, 07/25/2023
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
Blog
Supply Chain Risk
By Antonio Sanchez on Thu, 07/06/2023
The supply chains of today’s global economy rely heavily on technology and information systems to deliver finished goods and services to the end user. However, for all the benefits of a hyperconnected economy this introduces, supply chains also carry with them a high degree of risk.
Blog
Cyber Insurance - Assessing Risks and Securing Your Future
By Antonio Sanchez on Thu, 06/29/2023
Cyber insurance is not the most glittering side of cybersecurity, but it has certainly earned its place in today's security debate.
According to Statista, as of 2021, an average of 48 percent of organizations in selected countries worldwide had cyber insurance, with numbers being slightly higher for countries such as the U.S. (50 percent), Sweden (55 percent), and Austria (66...
On-Demand Webinar
How to Build a Successful IFS Security Strategy
By Sandi Moore
Learn how to achieve a successful IFS security strategy with IBM i security expert Sandi Moore.
Blog
Infosecurity Europe 2023 – That’s a Wrap!
By Nick Hogg on Tue, 06/27/2023
Infosecurity Europe has closed its doors for another year. The aftermath of these events can be a strange time; still reeling from the chaos of the show floor and nursing feet unaccustomed to such intense use, it’s often difficult to make sense of everything we’ve learned.
Blog
Reflections on Day One of Infosecurity Europe 2023
By Josh Davies on Thu, 06/22/2023
Josh Davies, Principal Technical Manager at Fortra, reflects on everything he’s learned at day one of Infosecurity Europe 2023.
Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating...
On-Demand Webinar
IBM i Capacity Planning – Cloud, On-Prem, or Hybrid?
By Randy Watson
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.