<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 06.26.19 by Eric Bruno

How to Avoid Scripting Nightmares for File Transfers

Scripting is a popular and powerful choice to automate repeatable file transfer tasks. It can be horrifying, though, to discover just how many scripts are relied on for the successful operation of your infrastructure. This and the time they take to execute are sure to...

Posted on 06.21.19 by Dan Franciscus

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.

Posted on 06.18.19 by Dan Franciscus

Using AaronLocker to Easily Deploy Microsoft AppLocker

If you are a Windows user, you have likely heard of Microsoft AppLocker. This whitelisting program allows Windows users to protect itself from disk based malware by way of restricting executable programs to a specific list of paths, hashes, or signed applications....

Posted on 06.17.19 by Greg Mooney

Podcast: Can Former Cyber Criminals Be Trusted?

If you work in the cyber security field, chances are you've run into current or former black hats. But some of these hackers have put their dark pasts behind them and are doing great things in the world cyber security research today. The big question is should an...

Posted on 06.14.19 by Jeff Edwards

The Real Cost of a Data Breach: Compliance Penalties are Just the Tip of the Iceberg

I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...

Posted on 06.11.19 by Michael O'Dwyer

Is Big Data Losing its Appeal in the Face of Data Privacy Concerns?

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.

Posted on 05.29.19 by Greg Mooney

Avoiding Data Loss During A Data Migration

Large scale data migrations is a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.

Posted on 05.21.19 by Jeff Edwards

The Compliance, Data Protection, and Privacy Glossary

Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...

Posted on 05.13.19 by Michael O'Dwyer

Is PSD2 Good for Banks And How Should IT Teams Implement It?

The EU’s PSD2 directive (a revised payment service directive) aims to regulate electronic payments in EU member countries. It has no impact on traditional paper-based transactions.

Posted on 05.08.19 by Greg Mooney

Australia's Privacy Act 1988 and the Thirteen Privacy Principles

If you are doing business in Australia, then you will need to study up on the Federal Privacy Act 1988 and its underlying principles.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.