-
Alan Jordan |
Greg J. Schmidt
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Article
What is Intelligent Process Automation (IPA)?
By Ravi Dirckze on Tue, 01/09/2024
Image
Text
In nearly all industries, artificial intelligence (AI) is held up as the vision for the future, with the promise to transform every aspect of business. But not all hype...
Blog
Generative AI in Cybersecurity
By Antonio Sanchez on Tue, 09/12/2023
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating...
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every...
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Case Study
Portmade NV Saves Time and Labour Creating Customs Declarations with Automate
Learn how Portmade NV uses intelligent automation to capture, extract, and import data on customs declarations forms, saving the equivalent of 3.5 FTEs.
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
Video
Learn What's New in Email Security at Fortra
By Alyn Hockey
This video will showcase Agari and Clearswift feature updates, new threat report findings, and how new Fortra Email Security tools create a more robust email security solution.
On-Demand Webinar
Transform Accounts Payable Processes with Intelligent Automation
By EJ Stanley
Whether your data is structured (from a spreadsheet, database, or portal), or unstructured (from emails, forms, and invoices), we’ll show you how an intelligent capture solution can transform your AP processes to save your team hours of manual work, cut back on errors, and save money by avoiding duplicate, late or overcharged invoices.
On-Demand Webinar
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
On-Demand Webinar
Intelligent Automation: The Smartest Way to Automate
Thu, 07/22/2021
Robotic process automation (RPA) is great for handling repetitive manual tasks, but what about tasks involving data that require more critical thinking? Turn to Intelligent Automation (IA). Discover how IA uses machine learning and other cutting-edge technology to take the pain out of data classification and analysis.
Whether your data is structured (from a spreadsheet,...
On-Demand Webinar
Fight Cyber Threats with IBM i Encryption
By Sandi Moore
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.