Created with Sketch.
22 minutes | a month ago
73: The Security and Legal Issues of 5G
Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and security implications of adopting 5G for critical infrastructure.
21 minutes | 3 months ago
72: Continuous Integration and Development
Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and development in a DevOps environment.
22 minutes | 3 months ago
71: Data Security in the Automotive Industry
Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implications this new tech has on security and compliance in the auto industry.
26 minutes | 3 months ago
70: Managing a Corporate M&A
In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition).
15 minutes | 4 months ago
69: IT Cutbacks During the Pandemic
John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the budget issues plaguing IT teams during the pandemic.
26 minutes | 4 months ago
68: 3 Ways Data is Exposed During Pandemic
In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host Greg Mooney has almost been phished over the past few months.
18 minutes | 6 months ago
67: Progress Releases MOVEit 2020 Managed File Transfer
Progress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that allows the ability to send and receive sensitive data on mobile devices.
23 minutes | 6 months ago
66: VPNs, Cybersecurity, and Data Privacy During COVID-19
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
25 minutes | 6 months ago
65: IT Troubleshooting and Pivoting During the Pandemic
Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the new normal of supporting a remote workforce.
21 minutes | 7 months ago
64: How IT Can Enable a Remote Workforce
Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions of supporting employees who are working from home during the COVID-19 crisis.
24 minutes | 9 months ago
63: Managing eWaste in a Secure and Compliant Manner
Ask any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. John Shegerian, the co-founder of ERI, a leading eWaste company, discusses the implications of eWaste in terms of security and compliance.
33 minutes | 9 months ago
62: Why Cyber Hygiene is So Important
Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it the same way as personal hygiene. How can we change how people perceive technology in a way that is secure?
19 minutes | 10 months ago
61: Defending Against Nation Sponsored Attacks
Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent threats. So what do we know and how can we better protect ourselves from these attacks?
23 minutes | 10 months ago
60: A Different Perspective on Shadow IT
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operations are a hindrance to agility in the workplace. Uri Haramati joins the Defrag This podcast to discuss his take on shadow IT.
17 minutes | a year ago
59: Using Automation to Protect Your Business Networks
On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and enhanced application security programs at several large and medium enterprises across various industries. In addition, Bauert is a localization and internationalization engineer for hardware and software products.
26 minutes | a year ago
58: IT Horror Stories
IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.
15 minutes | a year ago
57: Information Governance Report by Osterman Research
Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings.
11 minutes | a year ago
56: MOVEit 2019.1 Dedicated Cloud
19 minutes | a year ago
55: Data Collection and the Open Source Intelligence
12 minutes | a year ago
54: Archiving Data Today and Into the Future
Terms of Service
© Stitcher 2020