<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

podcasts

Posted on 02.07.19 by Greg Mooney

Podcast: Artificial Intelligence Vs. Automation for SecOps Teams

Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.

Posted on 02.01.19 by Jeff Edwards

Podcast - 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.

Posted on 01.31.19 by Jeff Edwards

Podcast: The State of Brexit and the GDPR in 2019

With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are left with few details as to how to navigate the minefield that is compliance.  To help, we talked to a lawyer who is an...

Posted on 01.25.19 by Greg Mooney

Podcast: State of Data Security in 2019

It’s hard to say if things are looking up or down for data security. It seems that companies across all industries are making a point to secure all their data in the wake of the massive data breaches of the past few years.

Posted on 12.28.18 by Jeff Edwards

Podcast: What it's like to Start Your Own IT Website

A lot of people dream of leaving their day job and starting their own business, but for many, the risk, and the leap of faith required to take it, is simply to great of an unknown. For the 40th edition of Defrag This, we spoke to someone who's taken that risk to launch...

Posted on 12.19.18 by Greg Mooney

Podcast : Top 6 Data Breaches of 2018

And here we are yet again. Another year and another array of data breaches to talk about over the course of the year. So what exactly defined 2018 when it came to data security?

Posted on 12.12.18 by Jeff Edwards

Podcast: Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast.

Posted on 12.04.18 by Greg Mooney

Podcast: API Security in the Cloud

Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.

Posted on 11.26.18 by Greg Mooney

Podcast: Is the GDPR Being Effective?

The GDPR is in effect and being enforced, and yet there are still so many questions as to how the new data protection regulation in the EU is going to influence how businesses approach the securing and processing of personal data of EU residents.

Posted on 11.07.18 by Greg Mooney

Podcast: Shadow IT Problems & Solutions

Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.