<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 01.08.18 by Kathleen Burns

19 Cybersecurity Experts To Follow on Twitter

Overwhelmed by twitter, but want to stay up to date with infosec news stories and events? Here are 19 cybersecurity experts that will point you in the right direction. 

Posted on 01.05.18 by Greg Mooney

Defrag This Week - Meltdown, Spectre, and iOS Performance Issues

New Year, (not so) new security problems. Hosts Greg Mooney and Jeff Edwards discuss some of the biggest tech news of this week.

Posted on 01.05.18 by Jeff Edwards

Meltdown: What you need to know about the Intel Core Bug Affecting Billions of Computers

Just last week, we were looking back at the most significant hacks and attacks of 2017, and wondering what lay ahead for 2018. Well, wonder no more.

Security researchers have discovered two major design flaws in Intel processor chips that affect millions of devices—in...

Posted on 01.05.18 by Kevin Conklin

Tap Into The Cloud For The Right Reasons

Microsoft Azure helps improve IT efficiency and the bottom line without sacrificing application performance.

Posted on 01.04.18 by Alex Jablokow

Hackers And Hoodies: A Timeless Duo

Hackers probably don't look the same way they're portrayed in the media. So, why have the quintessential images of dark, mysterious hackers prevailed?

Posted on 01.03.18 by Adam Bertram

Getting Started With PyCharm

In the Python world, PyCharm is designed to be the integrated development environment (IDE) necessary for any successful coding project.

Posted on 01.03.18 by Jacqueline Lee

SOX Compliance: What is the IT Team's Role?

Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.

Posted on 01.02.18 by Adam Bertram

How To Use PowerShell's Abstract Syntax Tree To Your Advantage

The PowerShell AST essentially breaks down the code into a hierarchical tree with each element representing a part of the tree, making the scripts self aware.

Posted on 01.02.18 by Greg Mooney

5 Reasons Why The Last Jedi Was a Great Star Wars Movie

Most of us have had a few weeks now to let it all sink in and maybe even get a second or third viewing of Star Wars: The Last Jedi.

Posted on 01.02.18 by Randy Franklin Smith

The Basics of File Transfer Encryption

The Internet is a scary place for businesses, which is obviously why many are paying closer attention to best practices for securing their file transfers. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.