podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Greg Mooney
Shows
The Sports Lunatics Show
April 2025 - Sports Lunatics - Vladdy Jr. Signs, Greg Millen, The Clemente Debacle in Pittsburgh
It seems like there is so much happening at the same time these days. At the same time as Alexander Ovechkin was scoring the goal that broke Wayne Gretzky's NHL record (another episode), Vladimir Guerrero Jr. was agreeing to terms with the Toronto Blue Jays, the hockey world lost Greg Millen, and the Pittsburgh Pirates were dealing with a public relations nightmare while insulting the family of Hall of Famer Roberto Clemente. Shawn and Howie deal with all of this. It's another lively episode.
2025-04-09
34 min
Best But Never Final: Private Equity's Pursuit of Excellence
Private Equity’s Essential Partner: Inside the World of Direct Lending with Greg Cashman
In this episode, Golub Capital’s Senior Managing Director, Greg Cashman, joins Lloyd Metz, Doug McCormick, and Sean Mooney to uncover the critical role of direct lenders in private equity. Greg shares Golub’s transition from private equity to direct lending, the importance of alignment between lenders and PE sponsors, and their underwriting strategies for companies and sponsors. Explore how private credit markets have evolved, what makes the best sponsors stand out, and why 2025 is shaping up to be a pivotal year for M&A. Packed with insights from decades of experience, this is an essential listen for private equi...
2025-01-21
52 min
The Sports Lunatics Show
Jan 2025 - Sports Lunatics - January 1 Bowl Games and Remembering Greg Gumbel
In this episode, Shawn and Howie discuss how January 1 Bowl games seem different today from the way they used to be. They talk about their thoughts on the playoff system in college football today and their memories of some their first January Bowl games and some great college teams they've seen in their lives. They also discuss what Greg Gumbel meant to each of them after his passing after Christmas of 2024.
2025-01-02
35 min
What We Really Want: Conversations About Connection
25 | Will Mooney: I Won't Try to Fix You
"Send us a message! (questions, feedback, etc.)"The best therapists are the ones who have done their own work. That's what I love about my guest Will Mooney. Will has his own story of unwanted sexual behavior, and also of serving in pastoral ministry. After finding his own help and recovery, his life went in a new direction, away from working in the church and into becoming a therapist. Not only A therapist, Will happens to be MY therapist. 😊In our conversation (which is NOT bound by confidentiality), we discuss how Will made the decision to...
2024-12-17
52 min
Priority Talk
Greg Davis before the Title IX Town Hall Meeting
Before attending a Title IX townhall meeting, Greg Davis is remote in Shelby County as talks with several political and community leaders, such as Moms for Liberty's Emily Jones, State Representative Susan DuBose, Alabama Unfiltered's Amie Beth Shaver, State Representative Arnold Mooney, and rising Junior Georgia Jane.
2024-07-02
50 min
Kingdom Over Coffee Podcast
Ep 125 - Go on Mission w/ God - Greg & Jean Hines
Every disciple of Christ has been called to GO, whether that's across the street or to another country. Greg and Jean Hines tell their inspiring story of life change and God's call on their life to serve in Honduras. Check it out! Check out Greg & Jean Hines: https://fhdhonduras.org/ FREE ebook! https://dl.bookfunnel.com/nbbgc9x12m Follow Kingdom Over Coffee on FB: https://www.facebook.com/KingdomOverCoffee
2023-06-30
55 min
Saturday Night Vibes
Goodbye to Pete Davidson, Kyle Mooney, Aidy Bryant and Kate McKinnon
Greg and Emily give Natasha Lyonne here laurels before offering their heartfelt gratitude to the four veterans’ final show. Here come the water works…
2022-05-24
46 min
Ethics and Culture Cast
Episode 67: Greg Wolfe
Writer, editor, publisher, and teacher, Gregory Wolfe has been called “one of the most incisive and persuasive voices of our generation” (Ron Hansen). Both as a thinker and institution-builder, Wolfe has been a pioneer in the resurgence of interest in the relationship between art and religion—a resurgence that has had widespread impact both on religious communities and the public square. As an advocate for the tradition of Christian Humanism, Wolfe has established a reputation as an independent, non-ideological thinker—at times playing the role of gadfly but ultimately seeking to be a reconciler and peacemaker.Special Guest: G...
2022-04-07
34 min
Defrag This
Digital asset anxiety: Is the biggest risk to data security in financial services often the most overlooked?
Protecting data remains a high priority with FSI’s as high-profile threats portraying complex supply chain attacks, such as the Solarwinds continue to make the headlines. Taking advantage of how organisations move digital assets remains an evergreen attack vector for cybercriminals. Take a listen to Sean Devaney, vice president at CGI and David Martin, Partner Manager at Progress Software as they converse with FSTech around some of these topics as well as some possible solutions to this digital dilemma.
2021-04-09
27 min
Thought Cops
Case File 204 with Greg
International man of mystery Greg joins us this week for another episode of Thought Cops, the spiritual successor to Film Dungeon. Support the show on Patreon Field Notes Women belong on the mic. If they want to, of course. Yet only 20% of podcasters are women. We're on a mission to- Yeah yeah, you get it. Space Jam discourse continues into yet another week. Papa John emerges from the hyperbolic time chamber and discusses the rigid training regimen that he's gone through. Mumford and son(s) get cancelled. You had...
2021-03-17
1h 37
Defrag This
73: The Security and Legal Issues of 5G
Expert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and security implications of adopting 5G for critical infrastructure.
2020-10-14
21 min
Defrag This
72: Continuous Integration and Development
Alex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and development in a DevOps environment.
2020-09-11
21 min
Defrag This
71: Data Security in the Automotive Industry
Nat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implications this new tech has on security and compliance in the auto industry.
2020-08-25
22 min
Defrag This
70: Managing a Corporate M&A
In this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition).
2020-08-13
25 min
Defrag This
69: IT Cutbacks During the Pandemic
John O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the budget issues plaguing IT teams during the pandemic.
2020-08-07
14 min
Defrag This
68: 3 Ways Data is Exposed During Pandemic
In this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host Greg Mooney has almost been phished over the past few months.
2020-07-14
26 min
Defrag This
67: Progress Releases MOVEit 2020 Managed File Transfer
Progress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that allows the ability to send and receive sensitive data on mobile devices.
2020-05-28
17 min
Defrag This
66: VPNs, Cybersecurity, and Data Privacy During COVID-19
Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.
2020-05-21
22 min
Defrag This
65: IT Troubleshooting and Pivoting During the Pandemic
Ben Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the new normal of supporting a remote workforce.
2020-05-12
24 min
Defrag This
64: How IT Can Enable a Remote Workforce
Jason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions of supporting employees who are working from home during the COVID-19 crisis.
2020-04-14
21 min
Defrag This
63: Managing eWaste in a Secure and Compliant Manner
Ask any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. John Shegerian, the co-founder of ERI, a leading eWaste company, discusses the implications of eWaste in terms of security and compliance.
2020-03-11
23 min
Defrag This
62: Why Cyber Hygiene is So Important
Dr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it the same way as personal hygiene. How can we change how people perceive technology in a way that is secure?
2020-02-26
33 min
Americana Music Profiles
Frances Mooney Interview
Frances Mooney has been playing bluegrass music for over 50 years - She joins me on this edition of Americana Music Profiles to talk about her interesting musical career and her new CD project, Wild and Free. Learn more about your ad choices. Visit megaphone.fm/adchoices
2020-02-12
24 min
Defrag This
61: Defending Against Nation Sponsored Attacks
Companies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent threats. So what do we know and how can we better protect ourselves from these attacks?
2020-02-05
19 min
Defrag This
60: A Different Prespective on Shadow IT
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operations are a hindrance to agility in the workplace. Uri Haramati joins the Defrag This podcast to discuss his take on shadow IT.
2020-01-24
22 min
Technado (Archived)
Technado, Ep. 135: Progress’ Greg Mooney
On this week’s episode, the team is joined by Greg Mooney from Progress, the company behind products like WhatsUp Gold and iMacros. Greg has an interesting background spanning marketing, engineering, and even IT security, and helped the team understand the implications of California’s CCPA law. In the news, the crew discussed Opera’s strange evolution from a browser to a predatory loan provider, a proof-of-concept exploit for the Microsoft-NSA crypto bug, and a list of the evilest companies around. Unsurprisingly, it featured more than a few tech giants.
2020-01-23
00 min
Technado
Technado, Ep. 135: Progress’ Greg Mooney
On this week’s episode, the team is joined by Greg Mooney from Progress, the company behind products like WhatsUp Gold and iMacros. Greg has an interesting background spanning marketing, engineering, and even IT security, and helped the team understand the implications of California’s CCPA law. In the news, the crew discussed Opera’s strange evolution from a browser to a predatory loan provider, a proof-of-concept exploit for the Microsoft-NSA crypto bug, and a list of the evilest companies around. Unsurprisingly, it featured more than a few tech giants.
2020-01-23
51 min
Living In Carver County Minnesota
Andy Mooney owner of Red Bench Bakery in Chaska talks about local business.
Andy Mooney has made a huge impact in downtown Chaska in a very short period of time with their Red Banch Bakery. It shows how accurate they were in their assessment that this was something the community needed and would support. Andy also discusses how they've expanded and what his outlook is for small businesses in small towns. He's bright and engaging and it was a fun interview.
2020-01-02
25 min
Defrag This
59: Using Automation to Protect Your Business Networks
On the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and enhanced application security programs at several large and medium enterprises across various industries. In addition, Bauert is a localization and internationalization engineer for hardware and software products.
2019-12-30
17 min
Defrag This
Defrag This: IT Horror Stories
IT professionals join the Defrag This podcast to tell the spookiest stories of their careers.
2019-10-28
26 min
Defrag This
Defrag This: Information Governance Report by Osterman Research
Greg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings.
2019-09-11
15 min
Defrag This
56: MOVEit 2019.1 Dedicated Cloud
2019-08-07
10 min
Defrag This
55: Data Collection and the Open Source Intelligence
2019-08-05
18 min
Defrag This
54: Archiving Data Today and Into the Future
2019-07-31
12 min
Defrag This
53: Big Business Facing GDPR Fines in the UK
2019-07-29
17 min
Defrag This
52: EMA Report - Network Performance Management Tools
In the case of network performance management, what are the most important metrics? Also, which tools are IT teams using to get this data to support the business infrastructure? The answer is “many” depending on who you ask.
2019-07-19
14 min
Defrag This
51: Have You Met? QBITS
In this latest Have You Met? podcast series, Greg Mooney chats with Daniel Hotz about manage file transfer solutions and how QBits is implementing manage file transfer tools in Switzerland, Germany, and Austria.
2019-07-12
07 min
Defrag This
50: Right and Wrong Way of Entering Infosec
2019-06-14
21 min
Defrag This
49: Have You Met? L8 Solutions
In this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch partner and how they are providing stellar IT solutions and services to their clients in the UK.
2019-04-16
14 min
Defrag This
48: MOVEit Integration with Mulesoft
2019-04-08
20 min
Defrag This
47: What is DevSecOps?
2019-04-08
17 min
Defrag This
Defragging March 2019
We're bringing you March's security and IT news!
2019-04-03
19 min
Defrag This
46: How DevOps Teams are Using Network Monitoring Tools
If your company isn’t developing software, just wait five minutes. Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal use only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. All this development means having to create your own development operations team. Development Operations (DevOps) has brought IT operations and development teams a lot closer than ever before. Both sides are using network monitoring and other IT tools in some capacity, but...
2019-03-12
22 min
Defrag This
45: Log Management Basics - What should You Collect?
Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, why to focus on those logs and what specifically to look for. It’s a great answer to the sysadmin who sets up a Log Management solution, watches the logs roll in and then asks “Ok, so now what?”
2019-02-14
11 min
Defrag This
44: 12 Years Later: How the TJX Hack Changed Security and Compliance
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
2019-02-12
12 min
Defrag This
43: AI vs Automation For SecOps Teams
Automated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far reaching and it’s important to know the differences between AI and Automation. Security Operations teams, or SecOps, are increasingly using AI along with automation to tackle advanced persistent threats, but what are the differences?
2019-02-01
13 min
Defrag This
42: State of GDPR and Brexit 2019
With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are left with little details as to how to navigate the minefield that is compliance. We talked to a lawyer who is an expert in GDPR compliance to learn more on how the GDPR is sizing up.
2019-01-31
14 min
Defrag This
41: What it's like to Start Your Own IT Website
Well-known PowerShell expert and Ipswitch contributer Adam Bertram, AKA Adam the Automator, discusses leaving his day job to start Techsnips.io, an e-learning platform for IT professionals.
2019-01-25
19 min
Defrag This
40: State of Data Security
Enterprise companies are coming under increasing scrutiny for their data security practices, or lack thereof depending on who you are talking about. Last month we looked at what transpired over the past year in data security news, but today we are going to take a look into the future of 2019.
2019-01-24
26 min
Defrag This
39: Top 6 Data Breaches of 2018
2018-12-15
22 min
Defrag This
38: WhatsUp Gold Integration with Connected TAC
2018-11-12
20 min
Defrag This
36: GDPR Effectiveness
Cybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far easier to get away with. The laws in place to help regulate society, such as Money Laundering and CCTV Regulations, just aren’t on the internet. That’s why at the end of the day, the internet is the New Frontier: It’s the Wild, Wild West, where the rules don’t apply. Luckily, a hero comes proverbially roaring in to save the digital-day! Chris Payne, Man...
2018-10-11
17 min
Defrag This
35: Monitoring Security In AWS
How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast. I recently got together with Will Bengtson, a security researcher with over a decade of experience in cybersecurity who works at Netflix. “The biggest thing for me is that we have a lot of accounts, a lot of instances, a lot of change in our environment. So monitoring for us has to be just a co...
2018-10-11
19 min
Defrag This
34: API Security In The Cloud
Too many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security. Unfortunately, far too many are caught off guard when they learn that the security of these web services is limited. Yes, you are purchasing a service from them, but the truth is, IT security within a shared API is a shared responsibility. Brad Geesaman sees it far too often. He’s been in IT security and infrastructure for over 15 years, working with Symantec, Blackfin, and others. He’s worked as an ethical hacker, teaching others how...
2018-10-11
17 min
Defrag This
33: Dark Web Traffic Analysis
Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has no place on the company network. In this episode we talked with Mark Towler, Senior Product Marketing Manager at Ipswitch, and Jim Cashman, Principal Product Manager at Ipswitch and Product Owner of WhatsUp Gold, about the challenges of dark web traffic and how a new feature of WhatsUp Gold gives IT teams a tool to address this problem.
2018-08-28
11 min
Defrag This
Prepping For Black Hat And DEF CON
2018-08-05
17 min
Defrag This
31: How to Prepare for a HIPAA Audit
How would you like to walk into an HIPAA audit? Most will go in wondering - or worrying - if the security measures in place reflect their company’s due diligence to protect their ePHI (electronic protected health information). Others will have the forethought to be proactive in their situation and know they have done what is necessary to protect the information for which they are responsible. We want you to be the latter.
2018-07-30
19 min
Defrag This
30: California's New Consumer Privacy Act
The European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed its own group of privacy protection laws meant to protect California residents from the mishandling of their personal information. As companies like Facebook and Equifax who have been front and center for the mismanagement of personal information for millions of people, what do new privacy laws mean for individuals and businesses? In this episode Greg and Jeff speak with Kevin Conklin, the Head of Product Marketing at Ipswich, about the steps the...
2018-07-12
13 min
Defrag This
29: What's the Necessary Experience For Entry-Level Cyber Security?
In episode 29 of the Defrag This podcast, we consider what it takes to be a cyber security professional.
2018-05-23
35 min
Defrag This
28: 3 Steps for Turning Cybersecurity Fears into an Action Plan w/ Paul McGough
Do the headlines about data breaches and information hacks have you worried, but you don’t know where to turn? If you’re afraid of having a cybersecurity “guru” take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
2018-05-23
21 min
Defrag This
Defragging April 2018
We're bringing you April's security and IT news!
2018-05-03
16 min
Defrag This
27: Going From Reactive mode to Predictive Mode with Connected TAC
Hate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue. Reactive mode can be a stressful operation mode that no company wants to work in, but what if we can go from reactive to predictive mode.
2018-05-02
14 min
Defrag This
26: What Can We Learn From the Iranian Phishing Attack
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information. Phishing attacks are becoming inevitable, but as a preventative measure - we need to learn what our risk factors are and make it harder for hackers to log into our accounts.
2018-04-07
22 min
Defrag This
25: Shadow IT: Problems & Solutions
Nothing frustrates and cripples IT more than individuals in varying departments going rogue. Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi off network. Sara from finance uses non-approved cloud storage for personal info of employees, exposing the data. Then Larry uses his own home laptop because the work computer has too many restrictions. All this and more causes headache after headache for IT. The problems abound, causing security threats and bogging down the IT department when they could be focused on bigger tasks? Two IT pros, Adam...
2018-04-07
16 min
Defrag This
Defragging March 2018
We're bringing you March's security and IT news!
2018-04-07
18 min
Defrag This
24: Mythbusting the GDPR and PECR
In this one we do some mythbusting.
2018-03-13
26 min
Defrag This
Defragging February 2018
We're bringing you February's security and IT news!
2018-03-03
11 min
Defrag This
Defragging January 2018
We're bringing you January's security and IT news right as it happens!
2018-02-02
16 min
Defrag This
23: Advantages to Python Networking for Automating Tasks w/ Eric Chou
With so many available languages, knowing which one to choose for automation can be overwhelming. In this interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.
2018-01-30
20 min
Defrag This
22: Cryptocurrency Volatility and the Blockchain w/ Adam Bertram
The cryptocurrency market is always changing. Is it a reliable investment, and who should be investing in it? In this episode Defrag This host Greg Mooney, and guest Adam Bertram, an IT industry expert, discuss the current cryptocurrency trend and what some of the downsides are to investing.
2018-01-23
12 min
Defrag This
Defrag the Week of 1/7/18
We're bringing you this week's security and IT news right as it happens!
2018-01-09
09 min
Defrag This
21: Looking Back at 2017's Biggest Data Breaches
In this episode of Defrag This, we're looking back on the year.
2017-12-22
34 min
Defrag This
20: 3 Things You Don’t Want to Forget While Prepping for GDPR w/ Paul Voigt
New regulations always mean a flurry of activity for affected companies, and the European Union’s new General Data Protection Regulation is no exception. The bill passed in 2016, but it gave companies two years to fall in line. That means the deadline of May 2018 is looming for companies with consumer data interests in the EU. Not making that deadline could mean fines and civil suits. And then there’s the possibility of cultivating a bad reputation for not caring enough about the protection of personally identifiable data of consumers.
2017-11-21
11 min
Defrag This
Ipswitch's Ribbon Cutting Ceremony
On this special episode of Defrag This, we're sharing the ribbon cutting ceremony for our new office. Hurray!
2017-11-16
08 min
Defrag This
19: The 3 Wi-Fi (In)Security Protocols w/ Brad Call
Can we ever be completely safe when it comes to wifi security? No. Cue the panic. Just kidding. We really can’t be 100% safe using wifi, but that doesn’t mean we should just throw caution to the wind and neglect any attempts at security whatsoever. There are security protocols available to help keep things more secure. But what are the differences and why do those differences matter? In this episode, Brad Call, wi-fi expert and consultant for Internal IT, gives us a breakdown of the three security protocols and how they...
2017-11-14
17 min
Defrag This
18: The Great Cyber War w/ Mary Manjikian
Fake news had been all over the news for months. Some people don’t believe it’s a real thing, and others believe that it is lurking behind every meme and Facebook ad. As usual, the truth is somewhere in the middle.The recent senate hearings related to the possibility of Russian interference in the American election have shined an even brighter spotlight on this issue. Outside interference from other nations is very real. It’s not exactly a new issue, but as our technology continues to leap forward faster than legislation can pin it down...
2017-11-07
13 min
Defrag This
17: PowerShell Vs. The World w/ Adam Bertram
Internet comment sections are often either amusing or horrifying places. There’s generally little in-between. This is particularly true in the computer programming world where some programmers can be almost slavishly devoted to their chosen deity… er… scripting language. Debates between users of different languages can be heated as everyone tries to defend their personal favorite as “the best.” It’s not necessarily clear what could objectively make one scripting language “better” than another overall, though. One language that gets more flak than it likely deserves is PowerShell. Proponents of Python can be especially brutal in their ridicul...
2017-10-10
15 min
Defrag This
Defrag This - Cyber Security Update - Week 091017
A weekly rollup of everything in the news relating to cyber security. Check in every week for breaking news in the cyber security spectrum.
2017-09-13
02 min
Defrag This
16: How to Help Users Stop Falling for Phishing Attacks w/ Arun Vishwanath
Have you ever had a doctor give you a pill to cure whatever ails you without first finding out what your symptoms are? Of course not. That would be unprofessional and reckless. Yet, that’s the equivalent of what many IT professionals are doing when they send their users training videos about how to avoid things like phishing scams. These videos or other one-size-fits-all anti-phishing training materials work to a point, but they aren’t nearly as effective as they could be with a little more understanding of the patient, erm, I mean, user. In...
2017-08-29
23 min
Defrag This
16: How to Help Users Stop Falling for Phishing Attacks w/ Arun Vishwanath
Have you ever had a doctor give you a pill to cure whatever ails you without first finding out what your symptoms are? Of course not. That would be unprofessional and reckless. Yet, that’s the equivalent of what many IT professionals are doing when they send their users training videos about how to avoid things like phishing scams. These videos or other one-size-fits-all anti-phishing training materials work to a point, but they aren’t nearly as effective as they could be with a little more understanding of the patient, erm, I mean, user. In...
2017-08-22
23 min
Defrag This
15: IoT in Healthcare: Endless Possibilities w/ Stephen Wu
The healthcare industry is at a crossroads when it comes to technology. Mobile devices and the IoT has given new and innovative ways to stay on top of our health from Fitbits to smartphone pedometers, but the vast amount of data these apps collect on our health is a blessing and a curse. Stephen Wu, a technology lawyer at Silicon Valley Law Group and the author of A Guide to HIPAA Security and the Law, knows that if healthcare data is not handled properly, patients risk having their information lost or stolen, which means healthcare providers risk...
2017-08-01
13 min
Defrag This
How Not to Hate Video Conferencing
It’s the bane of our existence—after printers, that is. Today at Cisco Live with Ryan Lewis, we will be talking about video conferencing. As we all know, the IT guy is always working his butt off behind the scenes to make sure that video conferencing is working right for his clients and that they don’t have any hiccups when they’re giving an important presentation or running an important meeting. Lewis is going to tell us what he’s using for video conferencing, why he’s using it, and the challenges he’s overcome to...
2017-07-25
10 min
Defrag This
14: NotPetya: Is it for the Money or the Infrastructure?
As if doing taxes weren’t bad enough, now cybercriminals have used an update to a Ukrainian tax software to spread malware to computers in multiple companies both in Ukraine and around the world. The infectious code looks like the ransomware Petya at first glance, but after a double-take, it looks more like a malware that is decidedly more sophisticated and is definitely NotPetya. Many are comparing it more accurately to the WannaCry attacks in May. In this episode of Defrag This, Scott Foote, cybersecurity expert and CEO of Protinuum, dives deep on the recent Not...
2017-07-14
17 min