Apr 9 | Digital asset anxiety: Is the biggest risk to data security in fina... Protecting data remains a high priority with FSI’s as high-profile threats portraying complex supply chain attacks, such as the Solarwinds continue to make the headlines. Taking advantage of how organisations move digital assets remains an evergre... |
Oct 14 | 73: The Security and Legal Issues of 5G Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and security implications of adopting 5G for critical infrastructure. |
Sep 11 | 72: Continuous Integration and Development Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and development in a DevOps environment. |
Aug 25 | 71: Data Security in the Automotive Industry Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implications this new tech has on security and compliance in the auto industry. |
Aug 13 | 70: Managing a Corporate M&A In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition). |
Aug 7 | 69: IT Cutbacks During the Pandemic John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the budget issues plaguing IT teams during the pandemic. |
Jul 14 | 68: 3 Ways Data is Exposed During Pandemic In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host Greg Mooney has almost been phished over the past few months. |
May 28 | 67: Progress Releases MOVEit 2020 Managed File Transfer Progress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that allows the ability to send and receive sensitive data on mobile devices. |
May 21 | 66: VPNs, Cybersecurity, and Data Privacy During COVID-19 Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic. |
May 12 | 65: IT Troubleshooting and Pivoting During the Pandemic Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the new normal of supporting a remote workforce. |
Apr 14 | 64: How IT Can Enable a Remote Workforce Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions of supporting employees who are working from home during the COVID-19 crisis. |
Mar 11 | 63: Managing eWaste in a Secure and Compliant Manner Ask any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. John Shegerian, the co-founder of ERI, a leading eWaste company, discusses the implications of eWas... |
Feb 26 | 62: Why Cyber Hygiene is So Important Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it the same way as personal hygiene. How can we change how people perceive technology in a way that is... |
Feb 4 | 61: Defending Against Nation Sponsored Attacks Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent ... |
Jan 24 | 60: A Different Perspective on Shadow IT Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operat... |
Dec 30 | 59: Using Automation to Protect Your Business Networks On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and en... |
Oct 28 | 58: IT Horror Stories IT professionals join the Defrag This podcast to tell the spookiest stories of their careers. |
Sep 11 | 57: Information Governance Report by Osterman Research Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings. |
Aug 7 | 56: MOVEit 2019.1 Dedicated Cloud |
Aug 5 | 55: Data Collection and the Open Source Intelligence |