Blog

Blog

How's Your File Transfer Process Running?

Is it time to upgrade your ride? If you’re still trying to drive file transfers in an outdated clunker, GoAnywhere MFT can get you back on the right track with a high-octane tune-up.
Blog

How Does the DMZ Impact Security?

The DMZ can be a good tool to add to your arsenal, but are you aware how it can impact your security negatively?
Blog

7 Reasons to Schedule Your Next Penetration Test

A foundational component of any security program is ensuring that the organization has a clear understanding of where risk resides. One of the most effective ways to understand infrastructure weaknesses and test your defenses is with a penetration test (aka: ethical hacking) assessment.The growing number of malware and ransomware attacks is a key indicator of the severity of risk for organizations...
Blog

What Are the Top File Transfer Protocols?

Before implementing the secure MFT solution of your choice, make sure you understand the basic file transfer protocols out there. Check out the top ones here.
Blog

How to Evaluate MFT Vendors

Choosing a robust MFT solution requires careful consideration of your business file transfer needs. Evaluate possible solutions with an eye towards performance, features, service and ROI.
Blog

What is PCI Compliance?

These days, companies are continually falling prey to attacks from thieves who get past their cyber security measures and steal consumer and financial data. They target system vulnerabilities to acquire the information they seek, which is usually cardholder data.Until 2004, there were no set regulations or standards for merchants and vendors to follow for preventing cardholder theft. Major credit...
Blog

Why You Need a Content Collaboration Platform

Working with your team isn’t always a breeze, but a content collaboration platform – a centralized tool that gives users secure access to files and folders – can simplify your processes.
Blog

Financial Sector Cybersecurity: How Do You Compare To Your Peers?

Comparing and quantifying your cybersecurity posture against peer organizations in the financial sector provides valuable context for how your cybersecurity program performs relative to others in your industry. Digital Defense’s Insight peer comparison report in the Fortra Vulnerability Management platform vulnerability and threat management platform provides actionable and detailed intelligence...
Blog

Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities

Microsoft Domain Controller “ZeroLogon” VulnerabilityA recent disclosure by Dutch security firm Secura B.V. has highlighted how dangerous a Netlogon vulnerability (CVE-2020-1472) included in the August 2020 Patch Tuesday release can be to a network. To exploit this vulnerability, an attacker with an established foothold in an internal network could exploit the weak cryptographic algorithm used by...
Blog

Why Should I Automate My IBM i?

Automation means more than efficiency, accuracy, and ROI. It has a real impact on the people who love and work with the platform every day, as well as those who will fill their shoes in days to come.
Blog

The Rising Role of Managed Service Providers in the Fight Against Cyber Attacks

In the battle against cyber adversaries, IT security professionals have to carefully balance competing objectives; protecting business assets and processes while enabling legitimate business operations and initiatives. Maximizing both objectives is challenging, especially in a highly competitive and digitally connected business environment. Far too frequently, sacrifices in cyber defenses and...