<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 11.08.18 by Jeff Edwards

How to Increase Collaboration Without Reducing Security

Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.

Posted on 11.06.18 by Greg Mooney

Election Day 2018 - US Electronic Voting Machines Still Have Security Flaws

Today is election day and voters are running to the polls to cast their vote. However, recent reports indicate that US citizens are not particularly confident in the technology used at the ballots. 

Posted on 10.31.18 by Mark Towler

Enforcing Security Policy Agreement at Sign On with MOVEit

It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.

Posted on 10.29.18 by Nate Lewis

Safeguarding Your Network From Insider Threats

"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...

Posted on 10.25.18 by Michael O'Dwyer

Benefits of Managed File Transfer for Banking and Finance

In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements. 

Posted on 10.19.18 by Greg Mooney

Securing Your IoT: What Can Your InfoSec Team Do?

Joining the Internet of Things phenomenon can generate valuable information for your business, but it also creates vulnerabilities that can threaten your digital assets.

Posted on 10.19.18 by Alex Jablokow

Balancing Security and Ease of Use with Two-Factor Authentication

Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...

Posted on 10.15.18 by Kevin Conklin

Which Secure File Transfer Solution Is Right for You?

You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.

Posted on 10.12.18 by Jeff Edwards

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government...

Posted on 10.11.18 by Greg Mooney

Defrag This - API Security in the Cloud

Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.