Blog
The LastPass Breach: What It Means for Privacy and Cybersecurity
At the end of 2022, LastPass announced that an unauthorized party was able to gain access to LastPass’ third-party cloud-based storage service …
What Does the Twitter Data Breach Mean for Cybersecurity?
In January 2023, the database from Twitter containing over 200 million users was published on a hacker forum, BreachForums. The data included …
What is Container Security?
It’s essential for organizations to assess their systems to identify all possible vulnerability points as security threats and opportunities to tamper with …
What Should a Company Do After a Data Breach?
It’s not just big companies that experience data breaches. Mid-sized and smaller companies are also facing the same issues each year when …
What is CVE in Cybersecurity?
Common Vulnerabilities and Exposures (CVE) is a database of public information on security issues. A CVE number identifies one vulnerability from that …
What Is Filtering In Cybersecurity?
Content filtering is one of the most common security solutions used for businesses. The primary function of filtering in cybersecurity is to …
Is SFTP Encrypted?
Transferring files is a crucial part of business for most large companies. When it comes to transferring larger files or large volumes …
Alternative to FTP: The Top Secure Alternatives to FTP
File Transfer Protocol, FTP, refers to a method to transfer files between devices over a network. Originally used as a way for …
What is Tailgating in Cyber Security?
Tailgating is a social engineering attack that hackers use to gain access to password-protected or other off-limits, software-protected physical locations. An unauthorized …
What is Cloning in Cyber Security?
Even as more businesses educate users on cybersecurity best practices, attackers find new ways to bypass training . They trick employees into …
Learning About Cyber Security
As technology continues to evolve, the demand for cybersecurity grows with it. Whether it’s being used to protect people’s home computers or …
What is Digital Asset Management?
Digital asset management (DAM) is how businesses store, share, organize, find, and retrieve digital files from their library of content, media, images, …
Trend Micro Cloud One Suite of Offerings
Security in the cloud is crucial to any company looking to keep its applications and data protected from cyber threats. Maintaining a …
What is Whaling in Cyber Security?
Whaling, or whaling phishing, is a cyber attack that occurs when the attackers utilize “spear phishing” methods to go after large, high-profile …
PacGenesis Partners with Top-Tier Technology Companies
PacGenesis is your trusted advisor for finding and implementing business solutions focused on digital file movement and security. We’re passionate about solving …
What is Role-Based Access Control?
An employee’s role in an organization determines the permission that individuals are granted and ensures lower-level employees can’t access sensitive information or …
What is Latency?
Latency is the amount of time that it takes for a signal to travel from a computer to a remote server and …
What is Throughput? An Explanation Of Throughput
Throughput refers to the amount of data that is able to be transmitted and received during a specific time period. Throughput measures …
3 File Size Limits with SharePoint
SharePoint refers to a few different products and technologies, all great when it comes to quality and the capabilities it offers. The …
Account Onboarding
Welcome, we’re glad to have you as an Aspera customer of PacGenesis, Inc! We hope to make your adoption of Aspera as …
What is Trend Micro Internet Security?
In today’s digital world, many daily activities rely on the internet. Forms of communication, entertainment, financial, and work-related tasks are done online. …
How to Prevent Data Breaches
As more companies move into a digital, cloud-based world, it’s become more common to hear of security breaches. The best way to …
What is Observability vs Monitoring?
Observability and monitoring are often referenced when discussing IT software development and operations strategies. They both play key parts in keeping systems, …
What is Zero Trust Architecture?
Zero Trust is an approach to cybersecurity that secures an organization by eliminating implicit trust and validating every stage of a digital …
What is SOC 1 vs SOC 2?
SOC stands for “System and Organization Controls”, formerly Service Organization Control reports. SOC covers a suite of reports from AICPA that CPA …
IBM Aspera Mobile Released
IBM Aspera Mobile v1.0 has been released for iOS and Android. This single app replaces all previous Aspera mobile apps and supports …
IBM Aspera Faspex 5 Released
Sections IntroductionAll-New InterfaceArchitecture and System ChangesAPI ChangesBreaking ChangesFuture Enhancements Introduction Aspera Faspex is a widely-used web application with an easy-to-use email-like interface …
IBM Support Portal – Updating Your Case Notifications Preferences
To update your profile settings: Visit the IBM Support Site at https://ibm.com/mysupport. If you are not already signed into the community, click the …
What is the Difference Between Proxy vs Reverse Proxy
Businesses often use proxy servers to help prevent cyber attackers from accessing their private networks. It is an “intermediary” between end-users and …
What Does StrongDM Do?
The way people manage access to infrastructure has changed since the cloud. There are a plethora of servers, database management systems, and …
What Does Zero-Day Vulnerability Mean?
When someone detects that a software or hardware contains a potential security issue, the vendor is notified appropriately in order to take …
What Does Data Breach Mean?
A data breach is a cybersecurity incident where malicious insiders or external hackers gain unauthorized access to data or sensitive information, including …
Privileged Access Management
Technology systems manage security with different levels of access based on user and/or group. This allows system administrators greater control and determines …
Faspex Newest Patch Level
IBM Aspera Faspex announced the latest release of the Faspex 5.0.1 and Faspex 4.4.1 Patch Level 12. Both of these releases resolve …
Cybersecurity and Media Streaming Companies
Sections AsperaIrdeto Aspera IBM Aspera focuses on overcoming the limitations that exist when moving big files over long distances. IBM Aspera is …
What is AWS
AWS, or Amazon Web Service, is a cloud platform that offers several on-demand operations to help corporate companies scale and grow. It …
What Clouds are Supported by Aspera and PacGenesis?
Aspera FASP high-speed transport platform provides businesses with a secure form of transportation for files, directories, and other large data sets to, …
Accessing the Faspex 5 Utility Application
Sections IntroductionConfigurationFaspex Utility Web InterfaceLearn More Introduction IBM Faspex 5 is the latest version of the popular Faspex web application, with modern …
Changing the Configuration of a Running Watch Folder
Sections IntroductionChanging the ConfigurationLearn More Introduction IBM Aspera High-Speed Transfer Server (HSTS) and High-Speed Transfer Endpoint (HSTE) include a powerful Watch Folder …
PacGenesis Announced as a 2022 IBM Champion Award Winner
Austin, TX, April 15, 2022 – PacGenesis is excited to announce they have won the IBM Champion Award for 2022, a program …
How to Use SFTP
As technology continues to evolve, the movement of data, information, and content is paramount to most industries. In many cases, transferring a …
Why Do Companies Conduct Cybersecurity Risk Assessments?
Cybercrime has become one of the largest threats to industries, especially in the digital age. Cybercriminals have sophisticated technology and techniques to …
What is Network Latency?
When there is a request sent to a server across the internet, there is a series of network reactions involved. A typical …
What is End-to-End Encryption File Sharing
Data transfer and file sharing are crucial to running a business in the digital age, but it has led to challenges for …
Aspera Shares Automated Backups
Sections IntroductionFiles to Backup After Shares Installation: Shares Backing up via Command LineShares Automated Backup Introduction IBM Aspera Shares is a web application …
Aspera HSTS (High-Speed Transfer Server) Automated Backups
Sections IntroductionFiles to Backup After HSTS Installation:HSTS Automated Backup of Redis DB: Introduction Your Aspera transfer server is a powerful, customizable hub …
Log File Locations for IBM Aspera Web Applications
Sections IntroductionAspera FaspexLinuxWindowsAspera SharesLinuxWindowsAspera ConsoleLinuxWindowsAspera Orchestrator Introduction IBM offers several customer-managed web applications that extend functionality and enable workflows around high-speed data …
Configuring Transfer Hostnames for Faspex and Shares
Sections IntroductionAspera FaspexAspera Shares Introduction IBM Aspera Faspex and IBM Aspera Shares are web applications that give a friendly web interface for …
Aspera Faspex Automated Backups
Sections IntroductionFiles to Backup After Faspex InstallationFaspex Backing up via Command LineFaspex Automated Backup Introduction IBM Aspera Faspex is a file exchange …