Podcast: Why Cyber Hygiene Is So Important
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
One of the favorite techniques for faster software delivery is the so-called continuous integration and deployment, or CI/CD for short.
It is no secret that with rising digitalization, the risks of hacking, spying, and stealing data online went up—a focus point of the development of cybersecurity in the automotive industry.
Greg Mooney | | Security
Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.
Greg Mooney | | Security
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
From data security to hardware issues, the new normal of a remote workforce has been chaos for IT teams.
Greg Mooney | | Security
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Greg Mooney | | Security
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?
In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.
We recently had a chance to sit down with Progress' partner, Orsenna, who has been serving WhatsUp Gold customers in Europe. More specifically, Switzerland.
When it comes to cost savings for IT operations and businesses in general, information governance is probably the last thing you think of. In this podcast, we discuss the implications of information governance.
Jeff Edwards | | File Transfer | Security
Businesses archive their data for a lot of reasons, but what is the most critical use case for archiving? For security or for posterity?
Greg Mooney | | Security
In this Have You Met? podcast, we sat down with Daniel Hotz of QBITS, a Progress partner based in Switzerland, to see how they are implementing MOVEit managed file transfer in the various regions they serve clients.
Greg Mooney | | Security
If you work in the cyber security field, chances are you've run into current or former black hats. But some of these hackers have put their dark pasts behind them and are doing great things in the world cyber security research today. The big question is should an...
Level 8 Solutions called into the Defrag This - Have You Met? podcast studio to provide some insight into how they are implementing IT solutions in the UK.
Greg Mooney | | Security
I got a chance to sit down with Kevin Conklin, the VP of Marketing at Ipswitch to talk more about the new MOVEit 2019 release and how the new MOVEit is now integrated with Mulesoft’s Anypoint Exchange.
Greg Mooney | | Automation | Security
Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.
Jeff Edwards | | Security
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Greg Mooney | | Cloud | Security
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.