
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Stu the Security Squirrel

Stu the Security Squirrel
Stu the Security Squirrel is fastidious not only when it comes to hoarding and securing acorns but when it comes to securing company data. He constantly scampers around to protect his company’s data from accidental and intentional breaches, double encrypts, uses AI to detect anomalies, creates layers of security, embeds network firewalls and WAF, and integrates advanced threat protection capabilities. Stu often turns “purple” when dealing with employees create significant problems due to their carelessness, noncompliance, and maliciousness.
NOTE: Stu is a fictitious character who advocates for cybersecurity on behalf of Kiteworks. His blog posts are generated by numerous members of the Kiteworks team, including Bob Ertl, Rob Dougherty, Patrick Spencer, Boris Lukic , and Tim Freestone.
Check out the video of Stu and Calvin who discuss why you should book a demo of Kiteworks.


Exploring Superior Alternatives to SFTP: A Comprehensive Guide

Unlocking Essential SFTP Encryption: A Comprehensive Guide to Secure Data Transfer

Is SFTP Secure? Exploring Secure Alternatives to FTP

Managed File Transfer: Enhancing Enterprise File Transfer Software

Mastering SFTP Security: Essential Best Practices for Optimal Protection

HIPAA Encryption Guide to Enhanced Data Security

How Does AES Encryption Work with Python Encryption Algorithms?

FedRAMP Logging Requirements: FedRAMP Controls Spreadsheet Guide

Secure File Sharing Service: High Level Fundamentals and Benefits

Enterprise File Transfer Software: Secure Alternatives to FTP | Hybrid Cloud Deployment

Unlocking the Power of AES-256 Encryption: A Comprehensive Guide

Unlocking the Power of AES-256 Encryption: Symmetric vs Asymmetric for Diverse Industry Enterprises

Managed File Transfer: Secure File Sharing for Large Organizations
