Join this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Join this live webinar on June 6th to learn more about AI and other document and forms management trends and how you can get started implementing them.
Your organization’s data is its most valuable asset. Retaining data properly helps ensure you meet industry compliance requirements and keep the trust of your customers or trading partners. Whatever your organization’s specific data retention policies may be, you’ll need to ensure that your data is secured at rest as well as in motion, with robust auditing and reporting of all file movements.
How can organizations create a work environment to retain cybersecurity talent? John Grancarich shares insights on keeping employees engaged and decreasing turnover rates.
Session Details **This session meets at multiple times.** Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. On May 8, Fortra CISO Chris...
The U.S. House of Representatives passed a bill that would ban TikTok unless its China-based parent company relinquishes its stake. Antonio Sanchez spoke with The Last Watchdog and shared his observations.
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Join this live webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
The recent US Executive Order promises progress in privacy protection. In this Diginomica article, Wade Barisoff shares his observations and discusses how this EO can help protect sensitive personal data.
JavaScript injection is a very powerful action for web browser automations. This allows users to interact with a website exactly as the website is expecting. Adding JavaScript to Automate’s web browser actions takes your automation a step further, allowing users to build automation that controls the site as a human would when needed. Join Austin Stanley, Technical Consultant, in this customer...
With a citizen-based developer interface, you can make it easy for users to customize and build workflows for their department with minimal involvement from IT. Watch this webinar to learn more.
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
Hackers are using AI to attack critical physical infrastructure. In his interview with PYMNTS, Antonio Sanchez discussed the potential threats that this could have on businesses and vital services.
Fortra is tracking activity connected with the Phishing-as-a-Service group Labhost as threat actors target Canadian banks. Originally published in IT Nerd . Excerpt: “Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service groups growing as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of...
What are the industry experts predicting for 2024? Eric George spoke with Digital IT News about how generative AI is changing the cybersecurity landscape.