<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | Greg Mooney

Recent Posts

Posted on 04.25.17 by Greg Mooney

Episode 8 - What is a Public Key Infrastructure?

In episode 8 of Defrag This, IT expert Missy Januszko, discusses the recent PowerShell and DevOps Global Summit 2017 and what exactly a public key infrastructure is.

Posted on 03.30.17 by Greg Mooney

Defrag This - Episode 7 - The Risky Business of FTP Servers

If you’re sending personally indentifiable information (PII) via basic FTP then your business is at risk. FTP servers do not provide the protections that are needed for today’s threat landscape.

Posted on 03.29.17 by Greg Mooney

3 Reasons Encryption Backdoors Are Counter Productive

It has been a year since the Apple vs. FBI case in which the FBI requested Apple create a backdoor into smartphones, and like clockwork, now the UK home secretary, Amy Rudd, is requesting backdoors into end-to-end encryption services used in Facebook’s texting app,...

Posted on 03.16.17 by Greg Mooney

Defrag This - Episode 6 - IT Networks in Dangerous Environments

In this episode of Defrag This, we  discuss the nuances of IT networks in dangerous industries.

Posted on 03.13.17 by Greg Mooney

March Madness Network and Security Considerations

It’s that time of the year again when employees flock to their favorite sports streaming sites to watch college basketball.

Posted on 03.02.17 by Greg Mooney

Defrag This - Episode 5 - What's Up with PowerShell and Pester?

In this episode of Defrag This, we're joined with Microsoft PowerShell MVP, Adam Bertram, as we pick his brain on what the big deal is about PowerShell and the test automation framework, Pester.

Posted on 02.02.17 by Greg Mooney

Defrag This - Episode 4 - Troubleshooting Business Networks

In this episode of Defrag This, we share stories from the trenches of IT and how we found unlikely solutions to troubleshoot business networks.

Posted on 02.01.17 by Greg Mooney

Deep Web Monitoring and the Future of Data Breach Detection

If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.

Posted on 01.19.17 by Greg Mooney

Defrag This - Episode 3 - Our Data Dystopia

George Orwell’s book 1984, which he wrote in 1948, depicts a dystopian future of mass surveillance and misinformation. Much of what he imagined is very true today.

Posted on 01.05.17 by Greg Mooney

Defrag This - Episode 2 - Encryption in a Unified Security Posture

Businesses in healthcare struggle with double standards, highly complex security infrastructure that is disjointed and redundant.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.