Resources

Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Blog

The 10 Principles of Automation

Our experts developed the following best practices for easing automation implementation and advancing automated operations over the course of 30 years of working to help businesses make their processes more efficient. Let the countdown begin!
Blog

Is the AS/400 Dead?

Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
Blog

IBM i: History and Timeline

Did you know that IBM i’s origins pre-date the AS/400 server? Read on for IBM i operating system history and the IBM server history that has supported this powerful platform for decades.
On-Demand Webinar

The Two Faces of SQL on IBM i

Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
Blog

Threat Actor Profile: Strox Phishing-as-a-Service

Strox phishing-as-a-service has become one of the most complete phishing solutions for fraud actors available, offering advanced phishing kits, hosting services, mail spam scripts, and an automated market for selling stolen credentials. Uncover the origins, evolution, and impact of Strox, a prominent player in the world of online fraud.
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your...
On-Demand Webinar

Navigating Today's HMC

The Hardware Management Console (HMC) has been around for many years, however, we still get plenty of questions from customers that are not familiar with the HMC. The HMC is nothing to be scared about – and IBM Power Champion Tom Huntington and we'll will show you why during this recorded webinar.
Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals...