<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

podcasts

Posted on 06.11.18 by Greg Mooney

Defrag This - 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Posted on 05.23.18 by Greg Mooney

Defrag This - What's the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...

Posted on 05.15.18 by Ashish Tawade

Defrag This - Using Intellectual Capital to Predict Issues in IT

Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue?

Posted on 05.04.18 by Jeff Edwards

Defrag the Month: The Biggest IT Stories from April 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From data leaks to the jailbroken Nintendos, April kept us on our toes.

Posted on 04.20.18 by Greg Mooney

Defrag This - What Can We Learn From the Iranian Phishing Attack

Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.

Posted on 04.13.18 by Greg Mooney

Defrag This - Shadow IT: Problems & Solutions

Shadow IT is a real problem -- here are the reasons, as well as a few solutions.

Posted on 04.04.18 by Jeff Edwards

Defrag the Month: The Biggest IT Stories from March 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From Iranian hackers to the return of ransomware and the Facebook scandal, March kept us on our toes.

Posted on 03.23.18 by Greg Mooney

Defrag This - Top 7 GDPR Myths

GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR). 

Posted on 03.07.18 by Kevin Conklin

PICNIC Podcast #24 — What is Intent Based Networking? 

In today’s PICNIC episode, we welcome Ronnie Ray, Senior Director of Product Management for DNA in the Enterprise Networking Business in Cisco, who explains what Intent Based Networking (IBN) is and why it matters.

Posted on 03.05.18 by Jeff Edwards

Defrag The Month: The Biggest IT Stories from February 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From the Olympic hacks to cryptominers on government websites to the continued fallout of the Meltdown/Spectre flaws, February kept us busy. In this edition of Defrag This,...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.