Jeff Edwards

Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.

Articles by the Author

Why you Shouldn’t Use FTP to Transfer Cloud Files
The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...
Why Auditable Access Controls Matter
By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...
Why Balancing Access Controls for Managed File Transfer Matters
If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...
Podcast: Why You should Archive Data Today and in The Future
Businesses archive their data for a lot of reasons, but what is the most critical use case for archiving? For security or for posterity?
Announcing MOVEit 2019.1, with Permission Configuration and Multiple Server Support
Progress and Ipswitch are proud to announce the release and general availability of MOVEit 2019.1, the newest iteration of the industry leading MOVEit secure managed file transfer (MFT) solution used by thousands of IT professionals to provide complete visibility,...
Why Your Encryption is Only as Good as Your (Multi-Factor) Authentication
Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation