<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Jeff Edwards
Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.
Find me on:

Recent Posts

Posted on 07.09.19 by Jeff Edwards

Why Your Encryption is Only as Good as Your (Multi-Factor) Authentication

Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...

Posted on 07.01.19 by Jeff Edwards

Encryption At Rest Isn't Good Enough

There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...

Posted on 06.17.19 by Jeff Edwards

Microservices Architecture: LEGO for DevOps

DevOps is one of the biggest trends in tech today, but it wouldn’t be half of what it is without microservices architecture.

Posted on 06.14.19 by Jeff Edwards

The Real Cost of a Data Breach: Compliance Penalties are Just the Tip of the Iceberg

I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...

Posted on 06.07.19 by Jeff Edwards

Why IT Automation is the Backbone of Every DevOps Transformation

DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps...

Posted on 05.21.19 by Jeff Edwards

The Compliance, Data Protection, and Privacy Glossary

Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...

Posted on 05.07.19 by Jeff Edwards

Understanding Brazil's General Data Protection Law

In this post, we’ll break down Brazil’s General Data Protection Law—who needs to comply, what is protected, and how to meet its requirements.

Posted on 04.23.19 by Jeff Edwards

Everything You Need to Know About China's Cybersecurity Law

In this article, we'll  answer some of the most common questions about the CSL, and make compliance goals as clear as possible.

Posted on 04.04.19 by Jeff Edwards

MOVEit Names Data Quadrant Gold Medalist in Info-Tech MFT Category Report

We’re proud to announce that Software Reviews, a division of research and advisory firm Info-Tech Research Group Inc., has named MOVEit® managed file transfer software as a Data Quadrant Gold Medalist in their new Managed File Transfer Category Report. 

Posted on 04.01.19 by Jeff Edwards

GDPR Overview: Complying with EU Laws for Personal Data

With the EU’s General Data Protection Regulation (GDPR) now in effect, GDPR preparedness should be top of mind for businesses everywhere, not just those based in the European Union (EU). This GDPR overview will take you through the basics, including the seven principles...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.