<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 09.11.18 by Alex Jablokow

An Introduction to FIPS-140-2 Requirements

FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.

Posted on 09.06.18 by Ashish Tawade

3 Phases of Network Security

Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.

Posted on 09.05.18 by Adam Bertram

5 Cool New Features in MOVEit 2018 SP1

These five new features in MOVEit 2018 Service Pack 1 will increase the speed and security of your business' automated file transfer workflows. There are also new improvements to MOVEit's REST API!

Posted on 08.31.18 by Jeff Edwards

Breaking Down the GDPR's Data Protection Principles, Part 4: Integrity, Confidentiality, and Accountability

It’s been months since the EU’s landmark data protection regulation, the General Data Protection Regulation (GDPR) went into full effect. This means that companies around the world now have to be more careful about the way they handle personal data collected about...

Posted on 08.27.18 by Michael O'Dwyer

How to Choose the Right Managed File Transfer Architecture

For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which offering is best...

Posted on 08.23.18 by Kevin Conklin

HIPAA Compliance & Managed File Transfer: Do You Have a Safety Net?

Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries. 

Posted on 08.21.18 by Adam Bertram

Cross-Site Scripting (XSS) and How MOVEit Transfer 2018 Protects You

Attackers wanting to steal your information online are some of the most creative people alive. It’s amazing how many ways they can come up with to steal your information. One of those ways is through a technique called cross-site scripting or XSS for short.

Posted on 08.20.18 by Rick Robinson

Prescription for Healthcare Data Encryption

It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...

Posted on 08.17.18 by Jeff Edwards

NSA Adviser Lists The Top Culprits for Nation State Hacking at DEF CON

The former chief of the NSA’s elite Tailored Access Operations Unit told DEF CON attendees who the top culprits for Nation State attacks are, and the results won’t surprise you at all. Except that he left the US off the list…

Posted on 08.06.18 by Nate Lewis

The Real Cost of File Transfer Software

We’re living in the age of information. In both the world of the enterprise and in our own personal lives, we expect speed first and foremost. The exchange of data between customers, employees, and partners is become a critical component of business operations. Shadow IT...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.