Security and Compliance

Explore by sub-topic:

MFT 2025 Blog Top Image 1200x620 Thumbnail
Managed File Transfer in 2025: Supporting IT Transformation
January 22, 2025
The 2025 IT prediction you need to know: Managed file transfer is key to helping you protect your org’s data.
Read Blog
E-discovery: Can Legal and IT Work Together?
E-discovery refers to the disclosure of information in electronic or digital formats as part of litigation, government investigations or requests that relate to the freedom of information act. The National Law Review notes that, in recent years, issues related to...
Understanding PowerShell Toolmaking
As we use PowerShell Toolmaking to automate more tasks, most of us eventually find ourselves reinventing the wheel. We write a script to do task X, another to do task Y, then task Z comes around. A few weeks go by and we begrudgingly write another script to do task X...
An Introduction to Exploit Kits
In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
API Security: 3 Ways to Evaluate API Management Systems
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation