Protecting data remains a high priority with FSI’s as high-profile threats portraying complex...
27:56
Protecting data remains a high priority with FSI’s as high-profile threats portraying complex...
27:56
73: The Security and Legal Issues of 5G
Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive...
21:31
72: Continuous Integration and Development
Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to...
21:10
71: Data Security in the Automotive Industry
Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology,...
22:00
In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT...
25:38
69: IT Cutbacks During the Pandemic
John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center...
14:51
68: Chat About Social Engineering
In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and...
26:12
67: Progress Releases MOVEit 2020 Managed File Transfer
Progress (formerly Ipswitch) released a new version of their managed file transfer product,...
17:41
66: VPNs, Cybersecurity, and Data Privacy During COVID-19
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online,...
22:43
65: IT Troubleshooting and Pivoting During the Pandemic
Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are...
24:43
64: How IT Can Enable a Remote Workforce
Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises,...
21:04
63: Managing eWaste in a Secure and Compliant Manner
Ask any digital forensics team or security researcher, and they will agree that data that is...
23:35
62: Why Cyber Hygiene is So Important
Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss...
33:01
61: Defending Against Nation Sponsored Attacks
Companies who don’t have their systems up to date are to this day running into variants of...
19:18
60: A Different Perspective on Shadow IT
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack...
22:45
60: A Different Perspective on Shadow IT
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack...
22:26
59: Using Automation to Protect Your Business Networks
On the phone today, we have someone who is helping IT and Security teams do just that. Alex...
17:02
IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.
26:02
57: Information Governance Report by Osterman Research
Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by...
15:10
492: onlyjames.fans
Episodio
ኢትዮጵያ የቅድመ ታሪክ የቡና መ0
Episodio
አዲስ የዘረመል ጥናት በኢትዮጵǤ
Episodio
Repelentes
Episodio
DynamoDB’s RCUs
Episodio
Blue Yetiってどんなマイク?【マイク9
Episodio