Defrag This-logo

Defrag This

News & Politics Podcasts >

More Information

Location:

United States

Language:

English

Contact:

405-206-8580


Episodes

36: GDPR Effectiveness

10/11/2018
More
Cybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far easier to get away with. The laws in place to help regulate society, such as Money Laundering and CCTV Regulations, just aren’t on the internet. That’s why at the end of the day, the internet is the New Frontier: It’s the Wild, Wild West, where the rules don’t apply. Luckily, a hero comes proverbially roaring in to save the...

Duration:00:15:46

35: Monitoring Security in AWS

10/11/2018
More
How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast. I recently got together with Will Bengtson, a security researcher with over a decade of experience in cybersecurity who works at Netflix. “The biggest thing for me is that we have a lot of accounts, a lot of instances, a lot of change in our...

Duration:00:17:59

34: Cloud Security At the API Level

10/11/2018
More
Too many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security. Unfortunately, far too many are caught off guard when they learn that the security of these web services is limited. Yes, you are purchasing a service from them, but the truth is, IT security within a shared API is a shared responsibility. Brad Geesaman sees it far too often. He’s been in IT security and infrastructure for over 15 years, working with Symantec, Blackfin,...

Duration:00:15:39

33: Dark Web Traffic Analysis

8/28/2018
More
This will be used for iTunes and other players where the episode appears. It should be, ideally, no longer than three paragraphs. And should include a concise summary of the episode, complete with guest name and position/qualifications.

Duration:00:07:42

32: Dark Web Traffic Analysis

8/28/2018
More
Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has no place on the company network. In this episode we talked with Mark Towler, Senior Product Marketing Manager at Ipswitch, and Jim Cashman, Principal Product Manager at Ipswitch and Product Owner of WhatsUp Gold, about the challenges of dark web traffic and how a new feature of WhatsUp Gold gives IT teams a tool to address this problem.

Duration:00:10:50

32: Blackhat and DefCon

8/5/2018
More

Duration:00:17:43

31: How to Prepare for a HIPAA Audit

7/30/2018
More
How would you like to walk into an HIPAA audit? Most will go in wondering - or worrying - if the security measures in place reflect their company’s due diligence to protect their ePHI (electronic protected health information). Others will have the forethought to be proactive in their situation and know they have done what is necessary to protect the information for which they are responsible. We want you to be the latter.

Duration:00:19:58

30: California Privacy Laws

7/12/2018
More
The European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed its own group of privacy protection laws meant to protect California residents from the mishandling of their personal information. As companies like Facebook and Equifax who have been front and center for the mismanagement of personal information for millions of people, what do new privacy laws mean for individuals and businesses? In this episode Greg and Jeff speak...

Duration:00:13:49

29: What Experience Do You Need to Be A Cyber Security Professional?

5/23/2018
More
In episode 29 of the Defrag This podcast, we consider what it takes to be a cyber security professional.

Duration:00:34:59

28: 3 Steps for Turning Cybersecurity Fears into an Action Plan w/ Paul McGough

5/23/2018
More
Do the headlines about data breaches and information hacks have you worried, but you don’t know where to turn? If you’re afraid of having a cybersecurity “guru” take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Duration:00:21:26

Defragging April 2018

5/3/2018
More
We're bringing you April's security and IT news!

Duration:00:16:39

27: Going From Reactive mode to Predictive Mode with Connected TAC

5/2/2018
More
Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue. Reactive mode can be a stressful operation mode that no company wants to work in, but what if we can go from reactive to predictive mode.

Duration:00:14:10

26: What Can We Learn From the Iranian Phishing Attack

4/7/2018
More
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information. Phishing attacks are becoming inevitable, but as a preventative measure - we need to learn what our risk factors are and make it harder for hackers to log into our accounts.

Duration:00:22:09

25: Shadow IT: Problems & Solutions

4/7/2018
More
Nothing frustrates and cripples IT more than individuals in varying departments going rogue. Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi off network. Sara from finance uses non-approved cloud storage for personal info of employees, exposing the data. Then Larry uses his own home laptop because the work computer has too many restrictions. All this and more causes headache after headache for IT. The problems abound, causing security threats...

Duration:00:16:50

Defragging March 2018

4/7/2018
More
We're bringing you March's security and IT news!

Duration:00:18:43

24: Mythbusting the GDPR and PECR

3/13/2018
More
In this one we do some mythbusting.

Duration:00:26:37

Defragging February 2018

3/3/2018
More
We're bringing you February's security and IT news!

Duration:00:11:33

Defragging January 2018

2/2/2018
More
We're bringing you January's security and IT news right as it happens!

Duration:00:16:25

23: Advantages to Python Networking for Automating Tasks w/ Eric Chou

1/30/2018
More
With so many available languages, knowing which one to choose for automation can be overwhelming. In this interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.

Duration:00:20:04

22: Cryptocurrency Volatility and the Blockchain w/ Adam Bertram

1/23/2018
More
The cryptocurrency market is always changing. Is it a reliable investment, and who should be investing in it? In this episode Defrag This host Greg Mooney, and guest Adam Bertram, an IT industry expert, discuss the current cryptocurrency trend and what some of the downsides are to investing.

Duration:00:12:43