In episode 8 of Defrag This, IT expert Missy Januszko, discusses the recent PowerShell and DevOps Global Summit 2017 and what exactly a public key infrastructure is.
If you’re sending personally indentifiable information (PII) via basic FTP then your business is at risk. FTP servers do not provide the protections that are needed for today’s threat landscape.
It has been a year since the Apple vs. FBI case in which the FBI requested Apple create a backdoor into smartphones, and like clockwork, now the UK home secretary, Amy Rudd, is requesting backdoors into end-to-end encryption services used in Facebook’s texting app,...
In this episode of Defrag This, we discuss the nuances of IT networks in dangerous industries.
It’s that time of the year again when employees flock to their favorite sports streaming sites to watch college basketball.
In this episode of Defrag This, we share stories from the trenches of IT and how we found unlikely solutions to troubleshoot business networks.
If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.
George Orwell’s book 1984, which he wrote in 1948, depicts a dystopian future of mass surveillance and misinformation. Much of what he imagined is very true today.
Businesses in healthcare struggle with double standards, highly complex security infrastructure that is disjointed and redundant.