x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Martin Horan

Founder of FTP Today and an expert in secure file transfer and Internet protocols. A software and IT geek since a young age, Martin has successfully led his companies through the digital age by spotting market niches and filling them with quality IT services.

Blog Feature

Cyber and Data Security Government Compliance

The Role of the AIA in Aerospace Cybersecurity

At FTP Today, we get asked a lot about aerospace cybersecurity. From who regulates aerospace to how to be compliant in the industry, it is critical to understand how the industry works. 

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and DFARS?

DFARS, or the Defense Federal Acquisition Regulation Supplement, was launched back in 2016 as a government effort to protect from cybersecurity attacks. For DoD contractors, this meant increased regulations and assessments for those working with controlled information. 

Read More

Blog Feature

Government Compliance

4 Steps to Becoming CMMC Compliant

As a DoD contractor, you are probably wondering how to prepare for the cybersecurity maturity model certification. Understanding the Cybersecurity Maturity Model Certification (CMMC) compliance process will help your business maintain security and continue to earn government contracts.

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and NIST?

If you are a DoD contractor, this summer you’ll be required to align with new CMMC regulations. With the new regulations coming with the Cybersecurity Maturity Model Certification, many DoD contractors are facing confusion and even frustration at the prospect of integrating a whole new cybersecurity model into their compliance efforts. A big question many in the industry have is how the new CMMC differs from other major regulations in the industry, especially those outlined in NIST publications.

Read More

Blog Feature

Government Compliance

The Levels of Cybersecurity Maturity Model Certification

The Cybersecurity Maturity Model Certification is a relatively new security framework created to help government contractors standardize security controls used to protect CUI  (controlled unclassified information). The Department of Defense plans to migrate to this new level-based certification model starting in June 2020. The CMMC framework is designed to indicate the maturity of a company’s cybersecurity efforts. The more mature your security controls are, the higher the level you will obtain. The ability to handle sensitive data will be dependent on your certification level.  As a provider of government compliant data sharing software solutions, FTP Today plans to study these new regulations to ensure we get the correct certification level so we can provide our users with compliant and up-to-date solutions.

Read More

Blog Feature

Government Compliance

Do DoD Contractors Need the Cybersecurity Maturity Model Certification?

The Cybersecurity Maturity Model Certification (CMMC) was a big announcement for the defense industry, and contractors for the Department of Defense who manage controlled unclassified information need to start preparing for major changes that will come as part of this process.

Read More

Blog Feature

FTP Solutions Government Compliance

Aerospace Cybersecurity Standards Explained

Cybersecurity is a widespread concern, the aerospace industry being no exception. In fact, in 2016 only 40% of aerospace and defense companies said they have a comprehensive set of security policies in place. That’s a surprisingly low number when you consider the major ramifications that could result from a data security breach.  As cybersecurity threats grow more common and more sophisticated, it’s vital that aerospace and defense companies understand the government recommendations in place related to data security and how to comply with those recommendations. 

Read More

Blog Feature

Government Compliance

The 4 Biggest Aerospace Cybersecurity Challenges

The aerospace industry is a particularly alluring target for cybersecurity hackers, which also means that those working in the industry need to be aware of possible threats. Here are four of the biggest and most common cybersecurity challenges faced by the aerospace industry.

Read More

Blog Feature

FTP Solutions Government Compliance

5 Tips for Using the FedRAMP Marketplace

The FedRAMP Marketplace is a helpful resource for federal agencies looking for FedRAMP compliant cloud vendors, products, agencies, assessors, and more. Choosing the best vendors to work with can be a time consuming and stressful process, especially when you don’t know where to begin your search. However, the FedRAMP Marketplace can drastically shorten the length of your search. 

Read More

Blog Feature

Cyber and Data Security secure file sharing

Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

When you think of user access security, you might think of traditional security measures, like submitting your username and password. While these basic security measures may have protected you in the past, they’re not quite strong enough to withstand advanced attacks from today’s hackers.  Thus, many organizations are turning to SSH-key authentication to provide a greater level of security for SFTP solutions compared to traditional password measures. In this article, we’ll look at what SSH-Key Authentication entails, and how this security measure protects your data better than other options. 

Read More