Resources

On-Demand Webinar

Fortra’s Penetration Testing Solution for Offensive Security

Cybersecurity is no longer a one-dimensional, defensive only mind-set. Attacks have become multi-pronged and organizational security solutions also need to act offensively. Proactive, layered offensive security should include multiple security solutions, including penetration testing, to uncover security risks before they’re exploited. Fortra’s Core Impact enables security teams to go on the...
On-Demand Webinar

Fortra’s Vulnerability Management Solutions for Proactive Security

Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions. Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
Press Release

Penetration Testing Still a Vital Part of Organizational Security Based on Annual Core Security Survey

MINNEAPOLIS (March 18, 2021)— Core Security, a Fortra Company, today announced the results of its annual penetration testing survey, with 85 percent of cybersecurity respondents reporting they pen test at least once per year. This finding is part of the more extensive 2021 Penetration Testing Report , which reveals that pen testing plays an essential role within organizations as part of a robust...
On-Demand Webinar

IBM i Security for Programmers

In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Video

5 IBM i Security Quick Wins

IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.