<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

podcasts

Posted on 10.12.18 by Greg Mooney

WhatsUp Gold Integration with Cisco Connected TAC

In this podcast, Ipswitch's Director of EMEA, John McArdle, discusses a new and powerful integration within Ipswitch's network monitoring tool, WhatsUp Gold.

Posted on 10.11.18 by Greg Mooney

Defrag This - API Security in the Cloud

Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make. 

Posted on 10.05.18 by Jeff Edwards

Defrag This - Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.

Posted on 08.03.18 by Jeff Edwards

Defrag This: Prepping For Black Hat and DEF CON

It's conference season, and we're right around the corner from two of the biggest InfoSec conferences in the world: BlackHat and DEF CON. In this episode of Defrag This our fearless hosts discuss their preparations for the hacker cons, what they're looking forward to,...

Posted on 07.30.18 by Greg Mooney

Defrag This - How to Prepare for a HIPAA Audit

Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.

Posted on 07.12.18 by Greg Mooney

Defrag This - California's New Consumer Privacy Act

In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.

Posted on 06.11.18 by Greg Mooney

Defrag This - 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Posted on 05.23.18 by Greg Mooney

Defrag This - What's the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...

Posted on 05.15.18 by Ashish Tawade

Defrag This - Using Intellectual Capital to Predict Issues in IT

Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue?

Posted on 05.04.18 by Jeff Edwards

Defrag the Month: The Biggest IT Stories from April 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From data leaks to the jailbroken Nintendos, April kept us on our toes.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.