<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 02.08.19 by Adam Bertram

How to Copy Files to Azure Blob Storage

When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.

Posted on 02.07.19 by Greg Mooney

Podcast: Artificial Intelligence Vs. Automation for SecOps Teams

Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.

Posted on 02.04.19 by Mark Towler

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports.

Posted on 02.01.19 by Jeff Edwards

Podcast - 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.

Posted on 01.29.19 by Dan Franciscus

Installing Duo 2FA for Windows Log-on and RDP

Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...

Posted on 01.25.19 by Greg Mooney

Podcast: State of Data Security in 2019

It’s hard to say if things are looking up or down for data security. It seems that companies across all industries are making a point to secure all their data in the wake of the massive data breaches of the past few years.

Posted on 01.22.19 by Michael O'Dwyer

Does the US Need a Constitutional Amendment for Data Privacy?

Data privacy seems to have surpassed all other technological buzzwords (with Big Data, AI and IoT largely responsible for the increase in available data) in the last few years, primarily because of the number of data breaches, which continues to rise unabated each year.

Posted on 01.15.19 by Greg Mooney

Honeypots Catch Winnie-the-Pooh…And Hackers Too!

Honeypot servers defend digital assets by attracting cybercriminals and allowing their activities to be analyzed.

Posted on 01.11.19 by Greg Mooney

The 3 Biggest Offenders of the GDPR

2018 will go down as the year that the rules changed for data privacy and data protection standards. I’m of course referring to the GDPR that was enacted in May 2018.

Posted on 12.19.18 by Greg Mooney

Podcast : Top 6 Data Breaches of 2018

And here we are yet again. Another year and another array of data breaches to talk about over the course of the year. So what exactly defined 2018 when it came to data security?

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.