Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.
Today is election day and voters are running to the polls to cast their vote. However, recent reports indicate that US citizens are not particularly confident in the technology used at the ballots.
It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.
"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...
In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements.
Joining the Internet of Things phenomenon can generate valuable information for your business, but it also creates vulnerabilities that can threaten your digital assets.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.
For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government...
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.