Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Stu the Security Squirrel

Stu the Security Squirrel
Stu the Security Squirrel is fastidious not only when it comes to hoarding and securing acorns but when it comes to securing company data. He constantly scampers around to protect his company’s data from accidental and intentional breaches, double encrypts, uses AI to detect anomalies, creates layers of security, embeds network firewalls and WAF, and integrates advanced threat protection capabilities. Stu often turns “purple” when dealing with employees create significant problems due to their carelessness, noncompliance, and maliciousness.
NOTE: Stu is a fictitious character who advocates for cybersecurity on behalf of Kiteworks. His blog posts are generated by numerous members of the Kiteworks team, including Bob Ertl, Rob Dougherty, Patrick Spencer, Boris Lukic , and Tim Freestone.
Check out the video of Stu and Calvin who discuss why you should book a demo of Kiteworks.
Exploring Superior Alternatives to SFTP: A Comprehensive Guide
Unlocking Essential SFTP Encryption: A Comprehensive Guide to Secure Data Transfer
Is SFTP Secure? Exploring Secure Alternatives to FTP
Managed File Transfer: Enhancing Enterprise File Transfer Software
Mastering SFTP Security: Essential Best Practices for Optimal Protection
HIPAA Encryption Guide to Enhanced Data Security
How Does AES Encryption Work with Python Encryption Algorithms?
FedRAMP Logging Requirements: FedRAMP Controls Spreadsheet Guide
Secure File Sharing Service: High Level Fundamentals and Benefits
Enterprise File Transfer Software: Secure Alternatives to FTP | Hybrid Cloud Deployment
Unlocking the Power of AES-256 Encryption: A Comprehensive Guide
Unlocking the Power of AES-256 Encryption: Symmetric vs Asymmetric for Diverse Industry Enterprises
Managed File Transfer: Secure File Sharing for Large Organizations