Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
Shadow IT is a real problem -- here are the reasons, as well as a few solutions.
New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From Iranian hackers to the return of ransomware and the Facebook scandal, March kept us on our toes.
GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR).
In today’s PICNIC episode, we welcome Ronnie Ray, Senior Director of Product Management for DNA in the Enterprise Networking Business in Cisco, who explains what Intent Based Networking (IBN) is and why it matters.
New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From the Olympic hacks to cryptominers on government websites to the continued fallout of the Meltdown/Spectre flaws, February kept us busy. In this edition of Defrag This,...
With so many available languages, knowing which one to choose for automation can be overwhelming. In our interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.
New Year, (not so) new security problems. And what a year it’s been! From the Meltdown/Spectre fallout to the rise of cryptojacking, to rumors of Dell buying itself back public, 2018 has been a hell of a year for the IT space—and it’s only been a month. In this edition...
Hosts Greg Mooney and Jeff Edwards welcome Adam Bertram into the Defrag This studio talk about cryptocurrency, the Bitcoin bubble, and the blockchain.
New Year, (not so) new security problems. Hosts Greg Mooney and Jeff Edwards discuss some of the biggest tech news of this week.