x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Cyber and Data Security Government Compliance

3 Reasons ITAR Compliance Is Important For Aerospace Companies

The aerospace industry has grown exponentially in recent memory. The transport of goods and services has become a major player in the global economy. But, with that growth has come increased regulation. In particular, regulations in data and file sharing led to the creation of ITAR, International Traffic in Arms Regulations.

Read More

Blog Feature

FTP Solutions

Why Do People Still Use FTP Sites?

File sharing options and acronyms can often be overwhelming to keep track of as the digital world continues to advance. With so many to choose from – FTP, SFTP, FTPS, HTTPS, EFSS, Collaboration Systems and more – it can be a challenge to distinguish between the options and select the best one for your organization. This is why so many companies default to using FTP (file transfer protocol) – one of the oldest and most basic forms of sharing data via the Internet.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

FTP Solutions File Sharing Best Practices

A Comparison of Dedicated FTP Servers and Cloud FTP Hosting

When it comes to file sharing, nothing is more important than security. But when there are so many solutions on the market, it can be difficult to determine which option will best meet your needs.

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

Cybersecurity Best Practices for Newly Remote Employees

Businesses all over the world are adjusting how employees work due to the coronavirus pandemic. One recent study reported that 90% of IT professionals believe remote workers are not secure. At the same time, over 70% think remote staff poses a greater risk than onsite employees. 

Read More

Blog Feature

Government Compliance

5 Aerospace Cybersecurity Trends for 2020

Aerospace cybersecurity is a growing topic in our industry – and not for the right reasons. With a lack of clear and required regulations, as well as an abundance of data and security risks, aerospace is quickly becoming one of the biggest targets for cybersecurity attacks in the world. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

What is the NAS9933 Aerospace Cybersecurity Standard?

Imagine you are the pilot of a plane, carrying delicate cargo – maybe the most important cargo: human passengers. Suddenly, your plane’s systems are infiltrated by a hacker with nefarious motives and you no longer have GPS or communication connection. Panic begins to set in as you struggle to maintain the safety and security of the aircraft.

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Role of the AIA in Aerospace Cybersecurity

At FTP Today, we get asked a lot about aerospace cybersecurity. From who regulates aerospace to how to be compliant in the industry, it is critical to understand how the industry works. 

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and DFARS?

DFARS, or the Defense Federal Acquisition Regulation Supplement, was launched back in 2016 as a government effort to protect from cybersecurity attacks. For DoD contractors, this meant increased regulations and assessments for those working with controlled information. 

Read More

Blog Feature

Government Compliance

4 Steps to Becoming CMMC Compliant

As a DoD contractor, you are probably wondering how to prepare for the cybersecurity maturity model certification. Understanding the Cybersecurity Maturity Model Certification (CMMC) compliance process will help your business maintain security and continue to earn government contracts.

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and NIST?

If you are a DoD contractor, this summer you’ll be required to align with new CMMC regulations. With the new regulations coming with the Cybersecurity Maturity Model Certification, many DoD contractors are facing confusion and even frustration at the prospect of integrating a whole new cybersecurity model into their compliance efforts. A big question many in the industry have is how the new CMMC differs from other major regulations in the industry, especially those outlined in NIST publications.

Read More