United States






61: Defending Against Nation Sponsored Attacks

Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent threats. So what do we know and how can we better protect ourselves from these attacks?


60: A Different Perspective on Shadow IT

Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operations are a hindrance to agility in the workplace. Uri Haramati joins the Defrag This podcast to discuss his take on shadow IT.


59: Using Automation to Protect Your Business Networks

On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and enhanced application security programs at several large and medium enterprises across various industries. In addition, Bauert is a localization and internationalization engineer for hardware and software products.


58: IT Horror Stories

IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.


57: Information Governance Report by Osterman Research

Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings.


52: EMA Report - Network Performance Management Tools

In the case of network performance management, what are the most important metrics? Also, which tools are IT teams using to get this data to support the business infrastructure? The answer is “many” depending on who you ask.


51: Have You Met? QBITS

In this latest Have You Met? podcast series, Greg Mooney chats with Daniel Hotz about manage file transfer solutions and how QBits is implementing manage file transfer tools in Switzerland, Germany, and Austria.


49: Have You Met? L8 Solutions

In this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch partner and how they are providing stellar IT solutions and services to their clients in the UK.


47: What is DevSecOps?



Defragging March 2019

We're bringing you March's security and IT news!


46: How DevOps Teams are Using Network Monitoring Tools

If your company isn’t developing software, just wait five minutes. Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal use only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. All this development means having to create your own development operations team. Development Operations (DevOps) has brought IT operations and development teams a lot closer than...


45: Log Management Basics - What should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, why to focus on those logs and what specifically to look for. It’s a great answer to the sysadmin who sets up a Log Management solution, watches the logs roll in and then...


44: 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.


43: AI vs Automation For SecOps Teams

Automated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far reaching and it’s important to know the differences between AI and Automation. Security Operations teams, or SecOps, are increasingly using AI along with automation to tackle advanced persistent threats, but what are the differences?