Securing Digital Communications Using a PKI
Just how protected are your passwords and credit card numbers when you enter them into websites? That's where PKI (public key infrastructure) comes in.
Just how protected are your passwords and credit card numbers when you enter them into websites? That's where PKI (public key infrastructure) comes in.
There is a growing trend in the data transfer arena. What is extreme file transfer and why is there an increasing need for it?
There are some serious difficulties ahead for businesses in the wake of the repeal of the US Internet Privacy Bill. How can US businesses comply with the GDPR?
Fintech is a valuable target for hackers seeking financial reward and we can’t stop all breaches without changing our attitude towards security.
The repeal of the FCC rule on ISP data mining has serious implications, not only for individual data privacy, but for businesses as well.
Assuring data privacy has been a hot issue for years and the basic building blocks of a strong defense against cybercriminal data theft hasn't changed.
Sophie Pellissier | | Security
Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.
Want to know how healthcare IT organizations can best prove their worth to the business? Optimize the 835 Remit and 837 Claim process so there are fewer rejections, clarifications, missed files and delays.
For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC.
Greg Mooney | | Security
If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.
Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...
Exfiltration is a decidedly unpleasant word, and it's rarely connected with Google's benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive? Google Drive, a potentially massive repository of...
While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Aaron Kelly | | Security
An audit to review PCI compliance at a large US-based transportation company revealed a number of file transfer problems that kept them from getting a passing grade. And with the PCI 3.1 “Business as Usual” mandate, the company’s auditors stressed the importance of...
Adam Bertram | | Security
When writing large PowerShell scripts or modules, it will eventually become necessary to split up the code into modular pieces. Modularity can be achieved by using basic and advanced PowerShell functions. It also encourages good coding practices. One way to build modular...
As noted by Tech Financials, infrastructure outsourcing is now a go-to option for service providers, since it allows them to maximize their strengths while shoring up their weaknesses with third-party expertise. But what does this trend mean for companies at large? Is it...
Adam Bertram | | Security
With companies moving services to the cloud, applications offering robust APIs and a driving need for automation, we need a more mature scripting language.
Adam Bertram | | Cloud | Security
As part of this cloud transition, it's important to realize that even though you can't see a system it still needs to be managed. Let's talk about PowerShell automation.
Adam Bertram | | Security
As an IT professional or manager, when you think of the word "script," what comes to mind? Are images of VBScript and batch files still haunting you to this day? Are you just thinking about a nice, little piece of code that automates some mundane task? If so, let's get...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.