SFTP for FedRAMP: Compliance and Authorization Solutions

Finding an SFTP server that’s FedRAMP authorized doesn’t have to be hard. We’re going to cover SFTP solutions that comply with FedRAMP requirements and maintain FedRAMP authorization. Is SFTP FedRAMP compliant? SFTP is an SSH (secure shell) file transf… Continue reading SFTP for FedRAMP: Compliance and Authorization Solutions

Best FedRAMP Authorized Solution for Email Security

When emailing federal data, your organization needs to find the right cloud security solution that is FedRAMP authorized to keep this data secure. Do you need FedRAMP certification for your email? Normal email security solutions might be insufficient t… Continue reading Best FedRAMP Authorized Solution for Email Security

Is SFTP GDPR Compliant? [How to Make SFTP GDPR Compliant]

Need your SFTP protocol to be GDPR compliant? Here are the GDPR requirements your company will need to prove compliance. Is SFTP GDPR Compliant? No, SFTP by itself is not GDPR compliant. Making SFTP compliant requires additional protocols, tests, appli… Continue reading Is SFTP GDPR Compliant? [How to Make SFTP GDPR Compliant]

Detect Anomalous Activity Ahead of a Data Breach With Heuristics

No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are there multiple login attempts from that location? If a financial analyst has never sent a fi… Continue reading Detect Anomalous Activity Ahead of a Data Breach With Heuristics

Working from Home Now? Here’s How to Do it Securely

Most employees work from home only occasionally. The Coronavirus outbreak, however, has recently relegated millions of employees to home offices, kitchen tables, and living room couches. We do our part to flatten the curve when we work from home. Plus,… Continue reading Working from Home Now? Here’s How to Do it Securely

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or supplier is just one connecte… Continue reading Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Protect Your Third Party Workflows With Security Infrastructure Integrations

CISOs must use every tool at their disposal to protect their PII, PHI, and IP. Most security-first organizations spend millions of dollars on security tools from firewalls and hardened networks to endpoint anti-virus software to multi-factor authentica… Continue reading Protect Your Third Party Workflows With Security Infrastructure Integrations

Strengthen Data Security and Governance with Metadata

If you want to protect the sensitive data you share with third parties, you need to know everything you can about that data. What data is being shared? Who’s sharing it? With whom are they sharing it? How are they sharing it? Ultimately, to prote… Continue reading Strengthen Data Security and Governance with Metadata

Lock Down Your Sensitive Data With Powerful Data Encryption

If you owned a big, expensive diamond ring, would you leave it on the dashboard in an unlocked car or would you keep it locked in a safe and insure it? If you truly value your valuables, you’ll take the necessary precautions to protect them from … Continue reading Lock Down Your Sensitive Data With Powerful Data Encryption

Successful CISOs Use This Essential Tool Sparingly

If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle that could stop a cyber attack or prevent a data breach. In the Information Age, every orga… Continue reading Successful CISOs Use This Essential Tool Sparingly