dcsimg

Podcast: Managing a Corporate Merger and Acquisition (M&A)

In the podcast show Defrag This, host Greg Mooney interviews Chris Hickman on how IT should approach mergers and acquisitions (M&As). … [Read more...]

Podcast: Cybersecurity in the Automotive Industry

It is no secret that with rising digitalization, the risks of hacking, spying, and stealing data online went up—a focus point of the development of cybersecurity in the automotive industry. … [Read more...]

Podcast: 3 Ways Data Is Being Exposed During the Pandemic

Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast. … [Read more...]

Podcast: VPNs, Cybersecurity, and Data Privacy During COVID-19

Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic. … [Read more...]

Podcast: IT Troubleshooting and Pivoting During the Pandemic

From data security to hardware issues, the new normal of a remote workforce has been chaos for IT teams. … [Read more...]

Podcast: How IT Can Enable a Remote Workforce

Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues. … [Read more...]

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices. … [Read more...]

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.  … [Read more...]

Podcast: A Different Perspective on Shadow IT

Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story? … [Read more...]

Podcast: Using Automation and Threat Modeling to Protect Your Network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues. … [Read more...]