<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 01.15.19 by Greg Mooney

Honeypots Catch Winnie-the-Pooh…And Hackers Too!

Honeypots defend digital assets by attracting cybercriminals and allowing their activities to be analyzed.

Posted on 01.11.19 by Greg Mooney

The 3 Biggest Offenders of the GDPR

2018 will go down as the year that the rules changed for data privacy and data protection standards. I’m of course referring to the GDPR that was enacted in May 2018.

Posted on 12.19.18 by Greg Mooney

Podcast : Top 6 Data Breaches of 2018

And here we are yet again. Another year and another array of data breaches to talk about over the course of the year. So what exactly defined 2018 when it came to data security?

Posted on 12.12.18 by Jeff Edwards

Podcast: Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.

Posted on 12.06.18 by Mark Towler

“Are You Sure That Went Through?” Viewing File Transfers in Real-Time

In a perfect world your file transfer solution would flawlessly complete every single file transfer quickly, completely and without delay. Unfortunately, we don’t live in a perfect world and a multitude of factors can delay or prevent your scheduled file transfers.

Posted on 12.04.18 by Greg Mooney

Podcast: API Security in the Cloud

Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make. 

Posted on 11.30.18 by Jeff Edwards

Marriott Hotels Discloses Data Breach Affecting 500M Customers

Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.

Posted on 11.28.18 by Greg Mooney

File Transfer Tools Can Lead to GDPR Non-Compliance

It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now. 

Posted on 11.26.18 by Greg Mooney

Podcast: Is the GDPR Being Effective?

The GDPR is in effect and being enforced, and yet there are still so many questions as to how the new data protection regulation in the EU is going to influence how businesses approach the securing and processing of personal data of EU residents.

Posted on 11.20.18 by Jeff Edwards

How to Detect and Stop Cryptomining on Your Network

If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.