<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Jeff Edwards
Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.
Find me on:

Recent Posts

Posted on 11.19.19 by Jeff Edwards

Bring Some Turkey to the Server Room This Thanksgiving

With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin. 

Posted on 11.04.19 by Jeff Edwards

AS2 vs. SFTP: Which is Best for You?

There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.

Posted on 10.25.19 by Jeff Edwards

Why Retailers Are a Soft Targets to Hackers (And What to Do About it)

Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions. 

Posted on 10.16.19 by Jeff Edwards

PCI DSS Compliance 101: What You Need to Know

If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...

Posted on 09.13.19 by Jeff Edwards

Why you Shouldn’t Use FTP to Transfer Cloud Files

The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...

Posted on 08.29.19 by Jeff Edwards

Why Auditable Access Controls Matter

By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...

Posted on 08.16.19 by Jeff Edwards

Why Balancing Access Controls for Managed File Transfer Matters

If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...

Posted on 08.07.19 by Jeff Edwards

Podcast: Why You should Archive Data Today and in The Future

Businesses archive their data for a lot of reasons, but what is the most critical use case for archiving? For security or for posterity?

Posted on 07.24.19 by Jeff Edwards

Announcing MOVEit 2019.1, with Permission Configuration and Multiple Server Support

Progress and Ipswitch are proud to announce the release and general availability of MOVEit 2019.1, the newest iteration of the industry leading MOVEit secure managed file transfer (MFT) solution used by thousands of IT professionals to provide complete visibility,...

Posted on 07.10.19 by Jeff Edwards

The UK's ICO is Handing Out GDPR Fines Like Candy

In the past week, British Airways and Marriott Hotels have been hit with a combined $350 million in fines.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.