So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...
Healthcare companies in the US have had to protect sensitive personal data for a long time to satisfy HIPAA compliance rules. But are healthcare companies on the hook in light of the GDPR?
The FCC’s repeal of net neutrality takes effect today (Monday, April 23rd) and it means a lot to all of us.
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
With the ability to quickly analyze massive amounts of data, businesses can increase customer interactions and drive workflow-process efficiencies.
GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR).
The relatively new approach to IT infrastructure design and data processing complements cloud computing to deliver key information to end users faster.
With so many available languages, knowing which one to choose for automation can be overwhelming. In our interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.
Hosts Greg Mooney and Jeff Edwards welcome Adam Bertram into the Defrag This studio talk about cryptocurrency, the Bitcoin bubble, and the blockchain.