Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn't it a bit early to start using the 4096-bit keys that have become increasingly available in encryption-enabled applications? It depends.Read More
Managed File Transfer and Network Solutions
Legislations that involve data protection or privacy always draw our attention because they often have implications to business transactions and file transfers. China's new Cybersecurity Law certainly falls into this category.
In this video tutorial, we'll show you how to automatically forward FTP uploads to an SFTP server.Read More
In this video, we'll show you how to automatically encrypt files uploaded to JSCAPE MFT Server.Read More
The days of HTTP pages on the Web appear to be numbered. Google has announced it would be labelling certain HTTP pages as "Not secure" when it releases Chrome 56 on January 2017. This is part of Google's ongoing effort to increase adoption of HTTPS. HTTPS is reinforced by SSL/TLS, making it a more secure version of HTTPRead More
Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS, SFTP, and HTTPS, data integrity/message authentication is usually achieved through a mechanism known as HMAC. In this post, we explain what HMAC is, its basic inner workings, and how it secures data transfers.Read More
As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad is and how you can apply it to your B2B data transfers.Read More
The first time a user connects to your SSH or SFTP server, his/her file transfer client may display an alert or notice indicating it doesn't recognize the server's fingerprint. What it's actually referring to is the server's SSH/SFTP key fingerprint, an important security feature that helps users and client applications authenticate SSH/SFTP servers. This post explains how it's used.
Most US states now have their own data breach notification law. If your business operations involve the storage and transfer of personal information, there are a couple of things you ought to know to reduce the risks and bring down the costs of compliance.Read More
Will Brexit have a significant impact on data transfers involving personal information? While it's hard speculate what the impact will be, it could largely depend on the specific path UK chooses to take once its separation from the EU is finalized.Read More