<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 06.11.19 by Michael O'Dwyer

Is Big Data Losing its Appeal in the Face of Data Privacy Concerns?

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.

Posted on 05.29.19 by Greg Mooney

Avoiding Data Loss During A Data Migration

Large scale data migrations is a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.

Posted on 05.21.19 by Jeff Edwards

The Compliance, Data Protection, and Privacy Glossary

Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...

Posted on 05.13.19 by Michael O'Dwyer

Is PSD2 Good for Banks And How Should IT Teams Implement It?

The EU’s PSD2 directive (a revised payment service directive) aims to regulate electronic payments in EU member countries. It has no impact on traditional paper-based transactions.

Posted on 05.08.19 by Greg Mooney

Australia's Privacy Act 1988 and the Thirteen Privacy Principles

If you are doing business in Australia, then you will need to study up on the Federal Privacy Act 1988 and its underlying principles.

Posted on 05.07.19 by Jeff Edwards

Understanding Brazil's General Data Protection Law

In this post, we’ll break down Brazil’s General Data Protection Law—who needs to comply, what is protected, and how to meet its requirements.

Posted on 05.06.19 by Greg Mooney

What is ISO 20022?

Many years since the initial publication of ISO 20022, more and more financial firms are beginning to leverage the standard.

Posted on 04.25.19 by Adam Bertram

How to Search Windows Event Logs Across Hundreds of Servers

The Windows event logs are a great place to start when troubleshooting problems or investigating potential security breaches.

Posted on 04.23.19 by Jeff Edwards

Everything You Need to Know About China's Cybersecurity Law

In this article, we'll  answer some of the most common questions about the CSL, and make compliance goals as clear as possible.

Posted on 04.23.19 by Frank Jablonski

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.