Ranked #1
19: The 3 Wi-Fi (In)Security Protocols w/ Brad Call
19: The 3 Wi-Fi (In)Security Protocols w/ Brad Call
Can we ever be completely safe when it comes to wifi security? No. Cue the panic. Just kidding. We really can’t be 100% ... Read more
14 Nov 2017
•
17mins
Ranked #2
29: What's the Necessary Experience For Entry-Level Cyber Security?
29: What's the Necessary Experience For Entry-Level Cyber Security?
In episode 29 of the Defrag This podcast, we consider what it takes to be a cyber security professional.
23 May 2018
•
35mins
Ranked #3
50: Right and Wrong Way of Entering Infosec
50: Right and Wrong Way of Entering Infosec
14 Jun 2019
•
21mins
Ranked #4
43: AI vs Automation For SecOps Teams
43: AI vs Automation For SecOps Teams
Automated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they... Read more
1 Feb 2019
•
13mins
Ranked #5
16: How to Help Users Stop Falling for Phishing Attacks w/ Arun Vishwanath
16: How to Help Users Stop Falling for Phishing Attacks w/ Arun Vishwanath
Have you ever had a doctor give you a pill to cure whatever ails you without first finding out what your symptoms are? O... Read more
22 Aug 2017
•
23mins
Ranked #6
30: California's New Consumer Privacy Act
30: California's New Consumer Privacy Act
The European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed... Read more
12 Jul 2018
•
13mins
Ranked #7
44: 12 Years Later: How the TJX Hack Changed Security and Compliance
44: 12 Years Later: How the TJX Hack Changed Security and Compliance
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007... Read more
12 Feb 2019
•
12mins
Ranked #8
48: MOVEit Integration with Mulesoft
48: MOVEit Integration with Mulesoft
8 Apr 2019
•
20mins
Ranked #9
49: Have You Met? L8 Solutions
49: Have You Met? L8 Solutions
In this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch part... Read more
16 Apr 2019
•
14mins
Ranked #10
47: What is DevSecOps?
47: What is DevSecOps?
8 Apr 2019
•
17mins
Ranked #11
34: API Security In The Cloud
34: API Security In The Cloud
Too many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security. ... Read more
11 Oct 2018
•
17mins
Ranked #12
40: State of Data Security
40: State of Data Security
Enterprise companies are coming under increasing scrutiny for their data security practices, or lack thereof depending o... Read more
24 Jan 2019
•
26mins
Ranked #13
24: Mythbusting the GDPR and PECR
24: Mythbusting the GDPR and PECR
In this one we do some mythbusting.
13 Mar 2018
•
26mins
Ranked #14
17: PowerShell Vs. The World w/ Adam Bertram
17: PowerShell Vs. The World w/ Adam Bertram
Internet comment sections are often either amusing or horrifying places. There’s generally little in-between. This is pa... Read more
10 Oct 2017
•
15mins
Ranked #15
21: Looking Back at 2017's Biggest Data Breaches
21: Looking Back at 2017's Biggest Data Breaches
In this episode of Defrag This, we're looking back on the year.
22 Dec 2017
•
34mins
Ranked #16
56: MOVEit 2019.1 Dedicated Cloud
56: MOVEit 2019.1 Dedicated Cloud
7 Aug 2019
•
10mins
Ranked #17
39: Top 6 Data Breaches of 2018
39: Top 6 Data Breaches of 2018
15 Dec 2018
•
22mins
Ranked #18
55: Data Collection and the Open Source Intelligence
55: Data Collection and the Open Source Intelligence
5 Aug 2019
•
18mins
Ranked #19
33: Dark Web Traffic Analysis
33: Dark Web Traffic Analysis
Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has ... Read more
28 Aug 2018
•
11mins
Ranked #20
Defragging March 2018
Defragging March 2018
We're bringing you March's security and IT news!
7 Apr 2018
•
18mins