<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 10.15.18 by Kevin Conklin

Which Secure File Transfer Solution Is Right for You?

You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.

Posted on 10.12.18 by Jeff Edwards

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government...

Posted on 10.12.18 by Greg Mooney

WhatsUp Gold Integration with Cisco Connected TAC

In this podcast, Ipswitch's Director of EMEA, John McArdle, discusses a new and powerful integration within Ipswitch's network monitoring tool, WhatsUp Gold.

Posted on 10.11.18 by Greg Mooney

Defrag This - API Security in the Cloud

Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make. 

Posted on 10.10.18 by Prateek Singh

Managing Windows System Administration with WMI and Python

Tired of managing Windows system administration tasks manually? Wish you could set up a few Python scripts instead? Where there's a will, there's a way! In this article, we'll show you how to install Python's WMI module and how you can use it to perform system...

Posted on 10.05.18 by Jeff Edwards

Defrag This - Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.

Posted on 10.03.18 by Nate Lewis

The IT Guide to Handling BYOD Security Risks in the Workplace

Holding off from adopting a BYOD policy is an uphill battle. In the past five years alone, we’ve seen a number of significant shifts in technology and workplace culture. With these new changes come new security risks, so how do we address them?

Posted on 10.02.18 by Prateek Singh

How to Manage AWS IAM Users with Python

Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud.  AWS IAM can prove very useful for System Administrators looking to centrally manage users,...

Posted on 09.28.18 by Nate Lewis

What you Need to Know About FIPS 140-2 Validation

One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...

Posted on 09.26.18 by Michael O'Dwyer

Internet of Things 101 – IoT Device Authentication Explained

Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.