Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
Automated Capacity Forecasting Using Predictive Analytics and Machine Learning
By Per Bauer on Mon, 06/07/2021
Better understand the different options for capacity forecasting and their characteristics, including using predictive analytics and machine learning. And learn how to choose the optimal forecasting method based on your business needs and maximize the accuracy and value of your planning efforts.
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
Blog
The DDoS Deception You Need to Know About
By Robin Tatam on Wed, 03/08/2017
A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog
What is the Value of SIEM?
By Robin Tatam on Wed, 03/08/2017
As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…