And here we are yet again. Another year and another array of data breaches to talk about over the course of the year. So what exactly defined 2018 when it came to data security?
How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.
In a perfect world your file transfer solution would flawlessly complete every single file transfer quickly, completely and without delay. Unfortunately, we don’t live in a perfect world and a multitude of factors can delay or prevent your scheduled file transfers.
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.
It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now.
The GDPR is in effect and being enforced, and yet there are still so many questions as to how the new data protection regulation in the EU is going to influence how businesses approach the securing and processing of personal data of EU residents.
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
One of the most persistent issues facing the modern IT team is the problem of Shadow IT. And that's the genesis of one of the most exciting new features of MOVEit 2018: the new Secure Folder Sharing capability. This new tool puts the power of creating and using secure...
Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.