Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
From data security to hardware issues, the new normal of a remote workforce has been chaos for IT teams.
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?
Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues.
In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.