It's conference season, and we're right around the corner from two of the biggest InfoSec conferences in the world: BlackHat and DEF CON. In this episode of Defrag This our fearless hosts discuss their preparations for the hacker cons, what they're looking forward to,...
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue?
New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From data leaks to the jailbroken Nintendos, April kept us on our toes.
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
Shadow IT is a real problem -- here are the reasons, as well as a few solutions.
New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From Iranian hackers to the return of ransomware and the Facebook scandal, March kept us on our toes.