<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

podcasts

Posted on 09.07.17 by Jeanne Hopkins

Podcast: Top 3 challenges of managing a small IT Team

If you’re a woman in IT, you know there really is no line for the ladies room—so it’s great to have a woman to talk about IT on the first episode.

Posted on 08.22.17 by Greg Mooney

Podcast: How to Help Your Users Stop Falling for Phishing Attacks

In this episode of Defrag This, Dr. Arun Vishwanath calls in to talk about his session at BlackHat and his years of research around the "people problem" of cyber security.

Posted on 07.25.17 by Greg Mooney

Podcast: How Not to Hate Video Conferencing

It’s the bane of our existence—after printers, that is. At CiscoLive! 2017, we had the chance to talk with Ryan Lewis, IT professional, about video conferencing. 

Posted on 07.21.17 by Greg Mooney

Podcast: NotPetya: Is it for the Money or the Infrastructure?

Here’s a deep dive on the recent NotPetya malware attacks and a peek at what future cyberattacks could look like.

Posted on 07.15.17 by Greg Mooney

Podcast: CiscoLive! 2017: Q&A with IPv6 Fundamentals Author Rick Graziani

This episode of Defrag This comes straight from the heart of CiscoLive! 2017, where I got a chance to chat with Rick Graziani about IPv6 and the latest edition of his book, which stands as a blueprint for IPv6 fundamentals. 

Posted on 06.19.17 by Greg Mooney

Podcast: Broken Data Security Models

In today’s threat landscape, much of the tools and knowledge, we use to protect ourselves and our business is outdated or even misinformed.

Posted on 06.01.17 by Greg Mooney

Data Transfer Show - Countdown to the GDPR

The subject of today’s Data Transfer Show is the countdown to the General Data Protection Regulation, otherwise known as the GDPR, which comes into effect May 25, 2018. 

Posted on 06.01.17 by Greg Mooney

Data Transfer Show - How to Leak Secure Data Like Crazy

Some hospitals use two, three, or more methods to transfer information—including snapping a photo on a cellphone for a consult. Which is scary, when you think about it. So how can IT professionals ensure information security in healthcare settings?

Posted on 05.22.17 by Greg Mooney

Podcast: WannaCry

WannaCrypt 2.0 aka WannaCry infected business networks around the globe and while the ransomware infections seem to have slowed, there is still a lesson to be learned here.

Posted on 05.12.17 by Greg Mooney

Podcast: Headless AI For Business

Headless AI, otherwise known as bots, are taking over the world. How can these headless AI help businesses get work done more effectively?

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.