<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 04.23.19 by Frank Jablonski

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.

Posted on 04.17.19 by Greg Mooney

MiFID II: What IT and Compliance Teams Need to Know

MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards.

Posted on 04.17.19 by Frank Jablonski

The Biggest Security Risks of Using 3rd Party APIs

Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.  

Posted on 04.10.19 by Kevin Conklin

HIPAA Compliance & Managed File Transfer: Do You Have a Safety Net?

Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries. 

Posted on 04.09.19 by Greg Mooney

What's Up with Wi-Fi 6?

Wi-Fi 6 is almost here and although it boasts some significant increase in speeds, it’s main attraction will be connecting and securing more devices at once since we are connecting more IoT and mobile devices to networks.

Posted on 04.04.19 by Greg Mooney

Podcast: What is DevSecOps?

For the past several years, DevOps has been the go-to method for fast software development lifecycles. But just like testing is an integral part of app development, security is an integral part as well. That's why the term DevSecOps was coined.

Posted on 04.01.19 by Jeff Edwards

GDPR Overview: Complying with EU Laws for Personal Data

With the EU’s General Data Protection Regulation (GDPR) now in effect, GDPR preparedness should be top of mind for businesses everywhere, not just those based in the European Union (EU). This GDPR overview will take you through the basics, including the seven principles...

Posted on 03.25.19 by Jeff Edwards

UK Government Orgs. Aren’t Updating Email Security, Survey Finds

Just 28% of gov.uk domains have implemented new email security standards from the Domain-based Message Authentication, Reporting and Conformance (Dmarc) protocol, according to a study from data security company Egress.

Posted on 03.22.19 by Greg Mooney

Podcast: New MOVEit Integration Available on MuleSoft AnyPoint Exchange

I got a chance to sit down with Kevin Conklin, the VP of Marketing at Ipswitch to talk more about the new MOVEit 2019 release and how the new MOVEit is now integrated with Mulesoft’s Anypoint Exchange.

Posted on 03.15.19 by Kevin Conklin

Why IT Won’t Let You Use Online File-Sharing Services

IT keeps schooling you about the dangers of Dropbox, Google Drive, OneDrive, and other online file-sharing services. But you still need to collaborate with your colleagues as well as your customers and business partners.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.