<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Jeff Edwards
Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.
Find me on:

Recent Posts

Posted on 11.30.18 by Jeff Edwards

Marriott Hotels Discloses Data Breach Affecting 500M Customers

Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.

Posted on 11.20.18 by Jeff Edwards

How to Detect and Stop Cryptomining on Your Network

If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking. 

Posted on 11.16.18 by Jeff Edwards

How to Use Secure Folder Sharing in MOVEit 2018

One of the most persistent issues facing the modern IT team is the problem of Shadow IT. And that's the genesis of one of the most exciting new features of MOVEit 2018: the new Secure Folder Sharing capability. This new tool puts the power of creating and using secure...

Posted on 11.08.18 by Jeff Edwards

How to Increase Collaboration Without Reducing Security

Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.

Posted on 10.12.18 by Jeff Edwards

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government...

Posted on 09.21.18 by Jeff Edwards

VIDEO: How to Discover Azure Virtual Machines in WhatsUp Gold 2018

A new feature in Ipswitch's WhatsUp Gold network monitoring product is the ability to monitor Azure Virtual Machines. In this video from Ipswitch contributor Adam Betram, we'll cover how to add an Azure credential to WhatsUp Gold and how to set up an initial discovery to...

Posted on 09.13.18 by Jeff Edwards

Six Peer-Reviewed Alternatives to Gartner and Forrester Reports

If you work in IT, or if you're in any position to evaluate and choose IT tools, chances are you're familiar with the names Gartner and Forrester.

Posted on 08.27.18 by Jeff Edwards

Video: How to Download Files From Azure Blob Storage with MOVEit Automation

 One of the new features of Ipswitch's MOVEit Automation 2018 product is the introduction of REST APIs. In this video from Ipswitch contributor Adam Betram, we'll cover how to use PowerShell to first authenticate to a MOVEit Automation server and then we'll cover how to...

Posted on 08.20.18 by Jeff Edwards

Video: Using MOVEit Transfer's REST API to Transfer Files with PowerShell

One of the new features of Ipswitch's MOVEit Automation 2018 product is the introduction of REST APIs. In this video from Ipswitch contributor Adam Bertram, we'll cover how to use PowerShell to first authenticate to a MOVEit Transfer server and then we'll cover how to...

Posted on 08.17.18 by Jeff Edwards

NSA Adviser Lists The Top Culprits for Nation State Hacking at DEF CON

The former chief of the NSA’s elite Tailored Access Operations Unit told DEF CON attendees who the top culprits for Nation State attacks are, and the results won’t surprise you at all. Except that he left the US off the list…

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.