-
Sep 27, 2019, 00:00 AM
by
Sherwood Stranieri
In the 2018-2020 timeframe, the rollout of GDPR in the EU is having an impact on companies worldwide, thanks to its legislative reach beyond the EU’s borders. But companies also have to content with a wave of new data privacy legislation in the US, UK, China, and many...
Full story
-
Sep 27, 2019, 00:00 AM
by
Dan Franciscus
Knowing what software is installed on your desktops and servers is crucial in an organization. This is common sense to sysadmins. We like to know information such as installation date, version and who installed it. By default, in Windows, you can get some of this...
Full story
-
Sep 19, 2019, 00:00 AM
by
Greg Mooney
We recently had a chance to sit down with Progress' partner, Orsenna, who has been serving WhatsUp Gold customers in Europe. More specifically, Switzerland.
Full story
-
Sep 18, 2019, 00:00 AM
by
Greg Mooney
APIs are becoming a huge part of how healthcare organizations provide better care to patients. But what about the security concerns with APIs?
Full story
-
Sep 16, 2019, 00:00 AM
by
Jeff Edwards
There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...
Full story
-
Sep 11, 2019, 00:00 AM
by
Greg Mooney
When it comes to cost savings for IT operations and businesses in general, information governance is probably the last thing you think of. In this podcast, we discuss the implications of information governance.
Full story
-
Sep 9, 2019, 00:00 AM
by
Jeff Edwards
By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...
Full story
-
Aug 29, 2019, 00:00 AM
by
Mark Towler
A month ago we told you how MFA (Multi-Factor Authentication) is an essential part of your encryption strategy. This month we’re letting someone else tell you the same thing for even more confirmation.
Full story
-
Aug 28, 2019, 00:00 AM
by
Dan Franciscus
Recently at the Microsoft Build conference, it was announced that there is a new Windows terminal that can be used as an alternative to cmd of PowerShell, called Windows Terminal.
Full story
-
Aug 27, 2019, 00:00 AM
by
Greg Mooney
Nobody does IT security better than you and your InfoSec team. You developed a strategic plan that prevents most breaches, and for those that do slip by your perimeter defenses, you have a great tactical plan to identify and mitigate attacks as quickly as possible....
Full story
-
Aug 26, 2019, 00:00 AM
by
Greg Mooney
FTP (File Transfer Protocol) has been the standard bearer for sending or moving files too large for email. Today, those file transfers contain the lifeblood of an organization and so
Secure FTP is now critical.
Full story
-
Aug 22, 2019, 00:00 AM
by
Dan Franciscus
If you are a Windows user, you have likely heard of Microsoft AppLocker. This whitelisting program allows Windows users to protect itself from disk based malware by way of restricting executable programs to a specific list of paths, hashes, or signed applications....
Full story
-
Aug 16, 2019, 00:00 AM
by
Jeff Edwards
If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...
Full story
-
Aug 12, 2019, 00:00 AM
by
Michael O'Dwyer
Bluetooth security… Some consider it an oxymoron, like ‘global intelligence’ community or ‘offshore support’ while others recognize Bluetooth flaws and understand their causes. Whatever side of the fence your opinions lie, it’s fair to observe that Bluetooth has its...
Full story
-
Aug 7, 2019, 00:00 AM
by
Jeff Edwards
Businesses archive their data for a lot of reasons, but what is the most critical use case for archiving? For security or for posterity?
Full story
-
Jul 29, 2019, 00:00 AM
by
Dan Franciscus
In this article, we discuss how to grant users simple admin rights temporarily like installing software. This helps keep IT from getting bogged down.
Full story
-
Jul 25, 2019, 00:00 AM
by
Michael O'Dwyer
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case.
Full story
-
Jul 24, 2019, 00:00 AM
by
Greg Mooney
Ah, cryptography. It’s so important to us in our every day lives and yet it has one of the longest and confusing pasts of any type of technology we use today.
Full story
-
Jul 24, 2019, 00:00 AM
by
Jeff Edwards
Progress and Ipswitch are proud to announce the release and general availability of MOVEit 2019.1, the newest iteration of the industry leading MOVEit secure managed file transfer (MFT) solution used by thousands of IT professionals to provide complete visibility,...
Full story
-
Jul 22, 2019, 00:00 AM
by
Jeff Edwards
I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...
Full story