ITAR was enacted in 1976 to control the export of defense-related articles and services. It stipulates that non-US persons are not allowed to have logical or physical access to articles modulated by International Traffic in Arms Regulations; which…
As cloud computing continues to strengthen its hold over enterprise IT services market, the concerns around organizational readiness to address the growing security challenges also keep on escalating. Invariably, the shared and on-demand nature of cloud services gives way…
Data security is at the heart of the upcoming General Data Protection Regulation (GDPR). It sets strict obligations on data controllers and processors in matters pertaining data security while concurrently providing guidance on the best data security practices. And for…
You’ve probably been investigating 2-Factor Authentication (2FA) more recently. With each new data breach in the news, you increasingly realize that security doesn’t end with strong passwords. Two Factor Authentication, also known as 2FA, is a two-step verification method that…
The countdown for the European Union’s General Data Protection Regulation (GDPR), which will go into full effect in May 2018, is coming to a close. GDPR aims to solidify the data privacy rights of EU residents and the requirements…
The democratization of high-speed Internet coupled with the development of distributed information exchanges gave rise to the development of blockchain technology. Blockchain is the underlying technology that powers the crypto-currency Bitcoin; however, its uses transcend that. Simply put, a blockchain…
On the 31st of October 2008, the still mysterious Satoshi Nakamoto (probably a pseudonym for an individual or group) published a white paper introducing the concept of a peer to peer digital cash system referred to as Bitcoin. Bitcoin marked…
Over the past decade, cloud computing has transitioned from being a buzzword to becoming a staple technology for most enterprises, mainly driven by cloud’s accessibility, superior flexibility, and capacity compared to mainstream computing and storage techniques. However, just like mainstream…
FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery. FileCloud is deployed across 90 countries and has…
New Technology File System (NTFS) Hierarchical Tree Structure of NTFS One of the most important and often misunderstood pieces of functionality in Microsoft Windows is the File and Folder security permissions framework. These permissions not only control access to all…