Defrag This
Kanal-Details
Defrag This
Defrag This is a podcast for IT pros that features meaningful trends, commentary on breaking news, and more. We're producing the series because there's a lot of information (and misinformation) out there and we'd like to help you and your fellow IT pros get in front of whatever problem might be a...
Neueste Episoden
86 Episoden
Digital asset anxiety: Is the biggest risk to data security in financial services often the most overlooked?
Protecting data remains a high priority with FSI’s as high-profile threats portraying complex supply chain attacks, such as the Solarwinds continue to...

73: The Security and Legal Issues of 5G
Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and se...

72: Continuous Integration and Development
Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and de...

71: Data Security in the Automotive Industry
Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implica...

70: Managing a Corporate M&A
In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition...

69: IT Cutbacks During the Pandemic
John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the bud...

68: 3 Ways Data is Exposed During Pandemic
In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host...

67: Progress Releases MOVEit 2020 Managed File Transfer
Progress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that al...

66: VPNs, Cybersecurity, and Data Privacy During COVID-19
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed...

65: IT Troubleshooting and Pivoting During the Pandemic
Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the...

64: How IT Can Enable a Remote Workforce
Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions...

63: Managing eWaste in a Secure and Compliant Manner
Ask any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. Jo...

62: Why Cyber Hygiene is So Important
Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it th...

61: Defending Against Nation Sponsored Attacks
Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems....

60: A Different Perspective on Shadow IT
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, wh...

59: Using Automation to Protect Your Business Networks
On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of...

58: IT Horror Stories
IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.

57: Information Governance Report by Osterman Research
Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often ov...

56: MOVEit 2019.1 Dedicated Cloud

55: Data Collection and the Open Source Intelligence

54: Archiving Data Today and Into the Future

53: Big Business Facing GDPR Fines in the UK

52: EMA Report - Network Performance Management Tools
In the case of network performance management, what are the most important metrics? Also, which tools are IT teams using to get this data to support t...

51: Have You Met? QBITS
In this latest Have You Met? podcast series, Greg Mooney chats with Daniel Hotz about manage file transfer solutions and how QBits is implementing ma...

50: Right and Wrong Way of Entering Infosec

49: Have You Met? L8 Solutions
In this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch partner and how they are providing...

47: What is DevSecOps?

48: MOVEit Integration with Mulesoft


46: How DevOps Teams are Using Network Monitoring Tools
If your company isn’t developing software, just wait five minutes.
Many companies that never dreamed they’d be developing their own software a...

45: Log Management Basics - What should You Collect?
Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This your ho...

44: 12 Years Later: How the TJX Hack Changed Security and Compliance
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which...

43: AI vs Automation For SecOps Teams
Automated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—d...

42: State of GDPR and Brexit 2019
With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are lef...

41: What it's like to Start Your Own IT Website
Well-known PowerShell expert and Ipswitch contributer Adam Bertram, AKA Adam the Automator, discusses leaving his day job to start Techsnips.io, an e-...

40: State of Data Security
Enterprise companies are coming under increasing scrutiny for their data security practices, or lack thereof depending on who you are talking about.

39: Top 6 Data Breaches of 2018

38: WhatsUp Gold Integration with Connected TAC

36: GDPR Effectiveness
Cybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far eas...

35: Monitoring Security In AWS
How do you ensure the security of a third of America’s web traffic?
By comprehensively understanding the different attack vectors around the clo...