<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Jeff Edwards
Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.
Find me on:

Recent Posts

Posted on 08.16.19 by Jeff Edwards

Why Balancing Access Controls for Managed File Transfer Matters

If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...

Posted on 08.07.19 by Jeff Edwards

Podcast: Why You should Archive Data Today and in The Future

Businesses archive their data for a lot of reasons, but what is the most critical use case for archiving? For security or for posterity?

Posted on 07.24.19 by Jeff Edwards

Announcing MOVEit 2019.1, with Permission Configuration and Multiple Server Support

Progress and Ipswitch are proud to announce the release and general availability of MOVEit 2019.1, the newest iteration of the industry leading MOVEit secure managed file transfer (MFT) solution used by thousands of IT professionals to provide complete visibility,...

Posted on 07.10.19 by Jeff Edwards

The UK's ICO is Handing Out GDPR Fines Like Candy

In the past week, British Airways and Marriott Hotels have been hit with a combined $350 million in fines.

Posted on 07.09.19 by Jeff Edwards

Why Your Encryption is Only as Good as Your (Multi-Factor) Authentication

Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...

Posted on 07.01.19 by Jeff Edwards

Encryption At Rest Isn't Good Enough

There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...

Posted on 06.17.19 by Jeff Edwards

Microservices Architecture: LEGO for DevOps

DevOps is one of the biggest trends in tech today, but it wouldn’t be half of what it is without microservices architecture.

Posted on 06.14.19 by Jeff Edwards

The Real Cost of a Data Breach: Compliance Penalties are Just the Tip of the Iceberg

I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...

Posted on 06.07.19 by Jeff Edwards

Why IT Automation is the Backbone of Every DevOps Transformation

DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps...

Posted on 05.21.19 by Jeff Edwards

The Compliance, Data Protection, and Privacy Glossary

Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.