Type to search
Analyze a fileFree Tools

Blog: portable media

What Does 'Sheep Dip' Mean in Cyber Security?

To sheep dip your USB devices means to scan them for malware before introducing them into a secure network. USB sheep-dipping is important for secure environments.

read more

6 Potential Security Gaps in File Transfer Process for Critical Infrastructure

Not all critical infrastructure facilities are equipped to stop cyber criminals, who often try to exploit security gaps in the file transfer process.

Police Handing Out Malware-Infected USBs Is Not an Isolated Incident

Taiwanese police accidentally gave out USB drives containing malware as prizes for a security quiz, but the problem of infected USBs extends much further.

read more

Did You Miss Our Webinar About Digital Signing and Verification?

In July, I presented a new feature for Metadefender Kiosk and Client: digital signing and verification. If you missed the webinar, read a recap here.

OPSWAT Releases Media Validation for Metadefender Kiosk and ClientFuture post

OPSWAT released a new version of Metadefender Client that includes media validation, which allows it to be deployed with Metadefender Kiosk as part of a comprehensive solution to handle portable media in secure environments.

OPSWAT's New Metadefender Client Feature Protects Endpoints from Malware on USB Drives

OPSWAT announced the release of a new Metadefender Client feature that protects endpoints by blocking USB drives until they've been scanned by Metadefender.

Why Data Diodes Are Essential for Isolated and Classified Networks

Søren Elnegaard Petersen, Key Account Manager at Arbit Security, discusses the essential security components for organizations using isolated or air-gapped networks.

December in Review

The security risks of using portable media have been increasing, as the sophistication of malware has advanced over time. Read our month-in-review post to catch up on the most destructive malware of all time, the most recent media security innovations, and learn three ways to mitigate USB risks. 

read more

USB Security: Three Ways to Address USB Risks

USB drives pose security risks, but are also important for company efficiency. Learn about the three elements of USB security so that USB drives can be used without compromising corporate security.

read more

How Secure File Transfer Can Improve Security & Productivity for Critical Infrastructure

Attacks are becoming more sophisticated as digital control systems grow in complexity, and require different levels of automation. Learn how to meet these increasingly sophisticated challenges, and secure any sensitive Industrial Control Systems and SCADA network with threat-free data flows using an SFT server. 

Follow Us

Get our latest research and news in your inbox monthly