Blog

Blog

Reverse Proxy DMZ Secure Gateways Might Be the Missing Link in Your MFT Strategy

  By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously. The challenges of data...
Blog

What Makes FTP an Outdated Security Method

  Why is FTP an Outdated Protocol? FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic...
Blog

CriticalPast Introduces One of the World’s Largest Online Archives

On the 3rd of June, CriticalPast announced the launch of CriticalPast.com, an absolutely astonishing archive of historic footage and photographic images:  From the press release on Business Wire: CriticalPast’s library of more than 57,000 video clips is drawn from government sources and digitized, making it easy for users to search CriticalPast’s...