Blog – MFT Nation

heading-img-1
To Copyright APIs, or Not to Copyright, That is the Question

APIs Explained

Some MFT Nation readers are undoubtedly familiar with an “application programming interface,” or API for short.  An API is defined as a “popular element of programs that enable inter-program communications.”  For those wanting a more concrete definition, click here to read a very clever way of explaining an API in “laymen’s terms.” (more)

shutterstock_113259814A

 
The Swiss Army Knife of Enterprise Data Security

Being an IT professional, I am often asked the question:  “So Hanz, what exactly do you do?”  For a while now this conversation has been playing out the same way.  I respond by saying:  “I work for the software company, bTrade.”  Inevitably, the follow up question is asked:  “And what does bTrade do?” (more)

swiss_army

 
Chip and Pin, will EMV cards enhance security at POS?

Authentication is an essential function of a secure managed file transfer process.  Basically, authentication is the process of verifying “the source (identity), uniqueness, and integrity (unaltered contents) of a message.”  With TDXchange, users can be authenticated automatically using their network identity or by entering a secure username and password, or both. (more)

shutterstock_134946989A

 
Cybersecurity is a Journey, Not a Destination

Nine months ago, the National Institute of Standards and Technology (NIST) released version 1.0 of its Framework for Improving Critical Infrastructure Cybersecurity (Framework).  NIST recently sought and received public feedback from industry relating to “awareness” of, “experiences” with, and a proposed “roadmap for the future” of the Framework.  Since bTrade’s MFT Nation blog followed events leading up to the release of the Framework, we decided to provide some input on the post-release feedback from the public. (more)

securexchange

 
Lessons Learned from Cybersecurity Awareness Month: Will You Be Tricked or Treated?

As Cybersecurity Awareness month comes to an end this Friday (Halloween), I had to attempt to weave some spooky references into our closing blog post.   Our latest blog recaps bTrade’s cybersecurity tips and best practices, which we hope you will find informational and useful in your fight to prevent and stay ahead of the malicious attacks. (more)

 
Deciphering the Complexities Associated with Exporting Encryption Software

The stated goal of National Cyber Security Awareness Month 2014 is to “increase the American public’s understanding of basic cyber security practices and the role each of us plays in keeping cyberspace safe and secure.”  Export control is a vital cog in our country’s cybersecurity infrastructure, because it helps to prevent sensitive U.S. technology from falling into the hands of our enemies.  Yet few people actually know much about the export control process. (more)

 
Tuesday Tips: The Importance of Strong Passwords and Data Encryption Technology

As we head into week four of our participation in Cybersecurity Awareness Month, it is time again for bTrade’s Tuesdays Tips .  This week’s cybersecurity tips are centered on showcasing what “businesses can do to protect their organization, customers, and employees.”  For the purpose of this blog and its readership, we will focus on two such tips:  the importance of strong passwords, and using encryption technologies for data in-transit. (more)

 
White Hat Wednesday: The Importance of Managed File Transfer Certification at the User Level

We all understand the necessity and importance of third party certifications for vendors that sell Managed File Transfer (MFT) solutions and services.   At bTrade, our MFT solutions are FIPS 140-2 certified by the National Institute of Standards and Technology (“NIST”), and thus approved for use in government departments and regulated industries that transmit and store sensitive information.  While these types of certifications are critical to companies when purchasing MFT technology, it is also critical that the employees who are tasked with implementing and supporting these solutions have the necessary ongoing training and certification to stay current and up-to-date on best practices. (more)