x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Cyber and Data Security Government Compliance

Why DoD SAFE Replaced AMRDEC SAFE and What It Means for Your Business

AMRDEC SAFE was the leading solution in the government file-sharing space for a long time. However, given the increasing demands of security and file capacity, AMRDEC was replaced with a new solution called DoD SAFE

Read More

Blog Feature

Cyber and Data Security Government Compliance

3 Reasons ITAR Compliance Is Important For Aerospace Companies

The aerospace industry has grown exponentially in recent memory. The transport of goods and services has become a major player in the global economy. But, with that growth has come increased regulation. In particular, regulations in data and file sharing led to the creation of ITAR, International Traffic in Arms Regulations.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security File Sharing Best Practices

Cybersecurity Best Practices for Newly Remote Employees

Businesses all over the world are adjusting how employees work due to the coronavirus pandemic. One recent study reported that 90% of IT professionals believe remote workers are not secure. At the same time, over 70% think remote staff poses a greater risk than onsite employees. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

What is the NAS9933 Aerospace Cybersecurity Standard?

Imagine you are the pilot of a plane, carrying delicate cargo – maybe the most important cargo: human passengers. Suddenly, your plane’s systems are infiltrated by a hacker with nefarious motives and you no longer have GPS or communication connection. Panic begins to set in as you struggle to maintain the safety and security of the aircraft.

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Role of the AIA in Aerospace Cybersecurity

At FTP Today, we get asked a lot about aerospace cybersecurity. From who regulates aerospace to how to be compliant in the industry, it is critical to understand how the industry works. 

Read More

Blog Feature

Cyber and Data Security secure file sharing

Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

When you think of user access security, you might think of traditional security measures, like submitting your username and password. While these basic security measures may have protected you in the past, they’re not quite strong enough to withstand advanced attacks from today’s hackers.  Thus, many organizations are turning to SSH-key authentication to provide a greater level of security for SFTP solutions compared to traditional password measures. In this article, we’ll look at what SSH-Key Authentication entails, and how this security measure protects your data better than other options. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP). 

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

How BYOD Is Affecting Your Business's File Security

No longer just a novel approach to office technology, BYOD (bring your own device) policies have become common practice in today’s workplaces. It’s easy to see why as we grow more dependent on smartphones, tablets, laptops, and other devices by the day. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Difference Between ATO and P-ATO FedRAMP Authorization

For so many organizations, especially government agencies, it can feel like compliance requirements are increasing each day. It can be a challenge to keep up with all the necessary requirements Cloud Service Providers must meet. FedRAMP is one such requirement. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

6 Steps for Implementing the NIST Cybersecurity Framework

Implementing the NIST Cybersecurity Framework is one of the best ways to mitigate the risk of a data breach in your organization. If you want to keep your sensitive files protected from nefarious parties roaming the net, the best thing to do is to use this framework in your daily operations. Learn more about the NIST Cybersecurity Framework, and how it can help you keep your data protected.

Read More