<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 04.10.18 by Adam Bertram

Using the New MOVEit 2018 REST API with PowerShell

Logging into MOVEit's console or web interface works great for day-to-day management tasks or setting up one-time workflows but there are times when we need to automate with MOVEit Automation!

Posted on 03.29.18 by Jeff Edwards

How to Detect and Stop Cryptojacking on Your Network

If 2017 was the year of the ransomware attack, then 2018 is shaping up to be the year of cryptojacking, at least with the way things are going so far.

Posted on 03.23.18 by Jeff Edwards

Indictment of Iranian Hackers Highlights Data Security Concerns

US Government officials have announced a round of sanctions and criminal indictments against an alleged Iranian hacker network that targeted hundreds of universities, businesses, NGOs, and Government organizations world-wide.

Posted on 03.23.18 by Greg Mooney

Defrag This - Top 7 GDPR Myths

GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR). 

Posted on 03.20.18 by Michael O'Dwyer

IoT Security: What is It, and Why Does It Matter?

You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This...

Posted on 03.05.18 by Jeff Edwards

Defrag The Month: The Biggest IT Stories from February 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From the Olympic hacks to cryptominers on government websites to the continued fallout of the Meltdown/Spectre flaws, February kept us busy. In this edition of Defrag This,...

Posted on 02.27.18 by Alex Jablokow

We Need to Increase Focus on Endpoint Security

Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems. 

Posted on 02.12.18 by Jeff Edwards

2018 Olympics Site Snowed Under by Hackers: Who's Responsible?

Just four days in and the 2018 Winter Olympics have already seen their fair share of setbacks. First, there’s the norovirus, which has reportedly infected 194 athletes, then there’s the gale force winds, disrupting and postponing events. But forces of nature aside, the...

Posted on 02.08.18 by Jeff Edwards

Bad Karma: Typosquatters Set Up Fake 'Reddit.co' To Steal User Credentials

Aggregator and social network Reddit.com is one of the most popular websites on the internet. In fact, the site it touts itself as the “front page of the internet." But that level of popularity has made it a target for fraudsters, and now, Reddit users, especially those...

Posted on 02.06.18 by Michael O'Dwyer

Digital Threats to Democracy—Real and Imagined

Democracy is in many ways about protecting freedoms, the freedom of the press, the freedom to bear arms, to arm bears, to vote in elections, and much more. With the advancement of technology, many feel these freedoms are under threat and the alleged Russian interference...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.