Defrag This is a podcast for IT pros that features meaningful trends, commentary on breaking news, and more. We're producing the series because there's a lot of information (and misinformation) out there and we'd like to help you and your fellow IT pros get in front of whatever problem might be aro…
Protecting data remains a high priority with FSI’s as high-profile threats portraying complex supply chain attacks, such as the Solarwinds continue to make the headlines. Taking advantage of how organisations move digital assets remains an evergreen attack vector for cybercriminals. Take a listen to Sean Devaney, vice president at CGI and David Martin, Partner Manager at Progress Software as they converse with FSTech around some of these topics as well as some possible solutions to this digital dilemma.
Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and security implications of adopting 5G for critical infrastructure.
Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and development in a DevOps environment.
Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implications this new tech has on security and compliance in the auto industry.
In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition).
John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the budget issues plaguing IT teams during the pandemic.
In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host Greg Mooney has almost been phished over the past few months.
Progress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that allows the ability to send and receive sensitive data on mobile devices.
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the new normal of supporting a remote workforce.
Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions of supporting employees who are working from home during the COVID-19 crisis.
Ask any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. John Shegerian, the co-founder of ERI, a leading eWaste company, discusses the implications of eWaste in terms of security and compliance.
Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it the same way as personal hygiene. How can we change how people perceive technology in a way that is secure?
Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent threats. So what do we know and how can we better protect ourselves from these attacks?
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operations are a hindrance to agility in the workplace. Uri Haramati joins the Defrag This podcast to discuss his take on shadow IT.
On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and enhanced application security programs at several large and medium enterprises across various industries. In addition, Bauert is a localization and internationalization engineer for hardware and software products.
IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.
Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings.
In the case of network performance management, what are the most important metrics? Also, which tools are IT teams using to get this data to support the business infrastructure? The answer is “many” depending on who you ask.
In this latest Have You Met? podcast series, Greg Mooney chats with Daniel Hotz about manage file transfer solutions and how QBits is implementing manage file transfer tools in Switzerland, Germany, and Austria.
In this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch partner and how they are providing stellar IT solutions and services to their clients in the UK.
If your company isn’t developing software, just wait five minutes. Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal use only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. All this development means having to create your own development operations team. Development Operations (DevOps) has brought IT operations and development teams a lot closer than ever before. Both sides are using network monitoring and other IT tools in some capacity, but how is DevOps taking over functions that used to be in IT's wheelhouse? To find out, I spoke with Sean Kenworthy, Senior Manager of Development Operations and Release Engineering here at Ipswitch. We discuss: What is DevOps? How Does DevOps Use Network Monitoring? If There is a Problem Who Fixes It, DevOps or IT? Under Attack: How Network Monitoring Detected A Stealth DDOS
Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, why to focus on those logs and what specifically to look for. It’s a great answer to the sysadmin who sets up a Log Management solution, watches the logs roll in and then asks “Ok, so now what?”
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Automated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far reaching and it’s important to know the differences between AI and Automation. Security Operations teams, or SecOps, are increasingly using AI along with automation to tackle advanced persistent threats, but what are the differences?
With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are left with little details as to how to navigate the minefield that is compliance. We talked to a lawyer who is an expert in GDPR compliance to learn more on how the GDPR is sizing up.
Well-known PowerShell expert and Ipswitch contributer Adam Bertram, AKA Adam the Automator, discusses leaving his day job to start Techsnips.io, an e-learning platform for IT professionals.
Enterprise companies are coming under increasing scrutiny for their data security practices, or lack thereof depending on who you are talking about. Last month we looked at what transpired over the past year in data security news, but today we are going to take a look into the future of 2019.
Cybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far easier to get away with. The laws in place to help regulate society, such as Money Laundering and CCTV Regulations, just aren’t on the internet. That’s why at the end of the day, the internet is the New Frontier: It’s the Wild, Wild West, where the rules don’t apply. Luckily, a hero comes proverbially roaring in to save the digital-day! Chris Payne, Managing Director at Advanced Cyber Solutions over in the UK, joins me in a conversation to discuss GDPR’s effectiveness, (or lack thereof), and what we in our businesses can do about it to protect our customers’ personal data.
How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast. I recently got together with Will Bengtson, a security researcher with over a decade of experience in cybersecurity who works at Netflix. “The biggest thing for me is that we have a lot of accounts, a lot of instances, a lot of change in our environment. So monitoring for us has to be just a continuous game,” Will said. So since your cloud provider isn’t going to hold your hand on this one, you need to know about these three tools Will uses.
Too many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security. Unfortunately, far too many are caught off guard when they learn that the security of these web services is limited. Yes, you are purchasing a service from them, but the truth is, IT security within a shared API is a shared responsibility. Brad Geesaman sees it far too often. He’s been in IT security and infrastructure for over 15 years, working with Symantec, Blackfin, and others. He’s worked as an ethical hacker, teaching others how to root our security threats within their networks, and he’s currently providing private IT security consulting. He spoke at the Black Hat USA conference in Las Vegas, and after I heard him speak, I knew I had to have Brad on our DeFrag_This podcast. He came on the show and shared his expertise on how IT professionals can better protect their assets running on shared cloud platforms. You don’t want to miss this.
Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has no place on the company network. In this episode we talked with Mark Towler, Senior Product Marketing Manager at Ipswitch, and Jim Cashman, Principal Product Manager at Ipswitch and Product Owner of WhatsUp Gold, about the challenges of dark web traffic and how a new feature of WhatsUp Gold gives IT teams a tool to address this problem.
How would you like to walk into an HIPAA audit? Most will go in wondering - or worrying - if the security measures in place reflect their company’s due diligence to protect their ePHI (electronic protected health information). Others will have the forethought to be proactive in their situation and know they have done what is necessary to protect the information for which they are responsible. We want you to be the latter.
The European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed its own group of privacy protection laws meant to protect California residents from the mishandling of their personal information. As companies like Facebook and Equifax who have been front and center for the mismanagement of personal information for millions of people, what do new privacy laws mean for individuals and businesses? In this episode Greg and Jeff speak with Kevin Conklin, the Head of Product Marketing at Ipswich, about the steps the U.S. is taking to address privacy protection and what a state-by-state enactment may look like.
In episode 29 of the Defrag This podcast, we consider what it takes to be a cyber security professional.
Do the headlines about data breaches and information hacks have you worried, but you don’t know where to turn? If you’re afraid of having a cybersecurity “guru” take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue. Reactive mode can be a stressful operation mode that no company wants to work in, but what if we can go from reactive to predictive mode.
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information. Phishing attacks are becoming inevitable, but as a preventative measure - we need to learn what our risk factors are and make it harder for hackers to log into our accounts.
Nothing frustrates and cripples IT more than individuals in varying departments going rogue. Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi off network. Sara from finance uses non-approved cloud storage for personal info of employees, exposing the data. Then Larry uses his own home laptop because the work computer has too many restrictions. All this and more causes headache after headache for IT. The problems abound, causing security threats and bogging down the IT department when they could be focused on bigger tasks? Two IT pros, Adam Fowler and Billy York, join us today to share their frustrations, and solutions, on Shadow IT.