Look for any podcast host, guest or anyone
Showing episodes and shows of

Greg Mooney

Shows

The Sports Lunatics ShowThe Sports Lunatics ShowApril 2025 - Sports Lunatics - Vladdy Jr. Signs, Greg Millen, The Clemente Debacle in PittsburghIt seems like there is so much happening at the same time these days. At the same time as Alexander Ovechkin was scoring the goal that broke Wayne Gretzky's NHL record (another episode), Vladimir Guerrero Jr. was agreeing to terms with the Toronto Blue Jays, the hockey world lost Greg Millen, and the Pittsburgh Pirates were dealing with a public relations nightmare while insulting the family of Hall of Famer Roberto Clemente. Shawn and Howie deal with all of this. It's another lively episode.2025-04-0934 minBest But Never Final: Private Equity\'s Pursuit of ExcellenceBest But Never Final: Private Equity's Pursuit of ExcellencePrivate Equity’s Essential Partner: Inside the World of Direct Lending with Greg CashmanIn this episode, Golub Capital’s Senior Managing Director, Greg Cashman, joins Lloyd Metz, Doug McCormick, and Sean Mooney to uncover the critical role of direct lenders in private equity. Greg shares Golub’s transition from private equity to direct lending, the importance of alignment between lenders and PE sponsors, and their underwriting strategies for companies and sponsors. Explore how private credit markets have evolved, what makes the best sponsors stand out, and why 2025 is shaping up to be a pivotal year for M&A. Packed with insights from decades of experience, this is an essential listen for private equi...2025-01-2152 minThe Sports Lunatics ShowThe Sports Lunatics ShowJan 2025 - Sports Lunatics - January 1 Bowl Games and Remembering Greg GumbelIn this episode, Shawn and Howie discuss how January 1 Bowl games seem different today from the way they used to be. They talk about their thoughts on the playoff system in college football today and their memories of some their first January Bowl games and some great college teams they've seen in their lives. They also discuss what Greg Gumbel meant to each of them after his passing after Christmas of 2024.2025-01-0235 minWhat We Really Want: Conversations About ConnectionWhat We Really Want: Conversations About Connection25 | Will Mooney: I Won't Try to Fix You"Send us a message! (questions, feedback, etc.)"The best therapists are the ones who have done their own work. That's what I love about my guest Will Mooney. Will has his own story of unwanted sexual behavior, and also of serving in pastoral ministry. After finding his own help and recovery, his life went in a new direction, away from working in the church and into becoming a therapist. Not only A therapist, Will happens to be MY therapist. 😊In our conversation (which is NOT bound by confidentiality), we discuss how Will made the decision to...2024-12-1752 minPriority TalkPriority TalkGreg Davis before the Title IX Town Hall MeetingBefore attending a Title IX townhall meeting, Greg Davis is remote in Shelby County as talks with several political and community leaders, such as Moms for Liberty's Emily Jones, State Representative Susan DuBose, Alabama Unfiltered's Amie Beth Shaver, State Representative Arnold Mooney, and rising Junior Georgia Jane. 2024-07-0250 minKingdom Over Coffee PodcastKingdom Over Coffee PodcastEp 125 - Go on Mission w/ God - Greg & Jean HinesEvery disciple of Christ has been called to GO, whether that's across the street or to another country. Greg and Jean Hines tell their inspiring story of life change and God's call on their life to serve in Honduras. Check it out!  Check out Greg & Jean Hines: https://fhdhonduras.org/ FREE ebook! https://dl.bookfunnel.com/nbbgc9x12m  Follow Kingdom Over Coffee on FB: https://www.facebook.com/KingdomOverCoffee2023-06-3055 minSaturday Night VibesSaturday Night VibesGoodbye to Pete Davidson, Kyle Mooney, Aidy Bryant and Kate McKinnonGreg and Emily give Natasha Lyonne here laurels before offering their heartfelt gratitude to the four veterans’ final show. Here come the water works…2022-05-2446 minEthics and Culture CastEthics and Culture CastEpisode 67: Greg WolfeWriter, editor, publisher, and teacher, Gregory Wolfe has been called “one of the most incisive and persuasive voices of our generation” (Ron Hansen). Both as a thinker and institution-builder, Wolfe has been a pioneer in the resurgence of interest in the relationship between art and religion—a resurgence that has had widespread impact both on religious communities and the public square. As an advocate for the tradition of Christian Humanism, Wolfe has established a reputation as an independent, non-ideological thinker—at times playing the role of gadfly but ultimately seeking to be a reconciler and peacemaker.Special Guest: G...2022-04-0734 minDefrag ThisDefrag ThisDigital asset anxiety: Is the biggest risk to data security in financial services often the most overlooked?Protecting data remains a high priority with FSI’s as high-profile threats portraying complex supply chain attacks, such as the Solarwinds continue to make the headlines. Taking advantage of how organisations move digital assets remains an evergreen attack vector for cybercriminals. Take a listen to Sean Devaney, vice president at CGI and David Martin, Partner Manager at Progress Software as they converse with FSTech around some of these topics as well as some possible solutions to this digital dilemma.2021-04-0927 minThought CopsThought CopsCase File 204 with GregInternational man of mystery Greg joins us this week for another episode of Thought Cops, the spiritual successor to Film Dungeon. Support the show on Patreon Field Notes Women belong on the mic. If they want to, of course. Yet only 20% of podcasters are women. We're on a mission to- Yeah yeah, you get it. Space Jam discourse continues into yet another week. Papa John emerges from the hyperbolic time chamber and discusses the rigid training regimen that he's gone through. Mumford and son(s) get cancelled. You had...2021-03-171h 37Defrag ThisDefrag This73: The Security and Legal Issues of 5GExpert in implementing new critical infrastructure for businesses, Jimmy Jones of Positive Technologies, joins the podcast to discuss the legal and security implications of adopting 5G for critical infrastructure. 2020-10-1421 minDefrag ThisDefrag This72: Continuous Integration and DevelopmentAlex Oliveri, Director of Professional Services at Progress, joins the Defrag This podcast to discuss the intricacies of continuous integration and development in a DevOps environment.2020-09-1121 minDefrag ThisDefrag This71: Data Security in the Automotive IndustryNat Meron of C2A Security joins the podcast to discuss the advancements in automotive technology, connected cars, autonomous vehicles, and the implications this new tech has on security and compliance in the auto industry. 2020-08-2522 minDefrag ThisDefrag This70: Managing a Corporate M&AIn this episode of Defrag This, Chris Hickman of Keyfactor joins the podcast to discuss how IT should approach a corporate M&A (merger and acquisition). 2020-08-1325 minDefrag ThisDefrag This69: IT Cutbacks During the PandemicJohn O’Shaughnessy, Infrastructure Architect and Senior Consultant at Insight Cloud + Data Center Transformation, joins the podcast to discuss the budget issues plaguing IT teams during the pandemic. 2020-08-0714 minDefrag ThisDefrag This68: 3 Ways Data is Exposed During PandemicIn this episode, Arun Vishwanath joins the podcast to discuss the rise in phishing scams and social engineering during the pandemic and ways that host Greg Mooney has almost been phished over the past few months. 2020-07-1426 minDefrag ThisDefrag This67: Progress Releases MOVEit 2020 Managed File TransferProgress (formerly Ipswitch) released a new version of their managed file transfer product, MOVEit 2020. The release includes a new mobile app that allows the ability to send and receive sensitive data on mobile devices. 2020-05-2817 minDefrag ThisDefrag This66: VPNs, Cybersecurity, and Data Privacy During COVID-19Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic. 2020-05-2122 minDefrag ThisDefrag This65: IT Troubleshooting and Pivoting During the PandemicBen Niernberg, Executive VP of MNJ Tehcnologies, joins the podcast to discuss how IT teams are dealing with hardware shortages, price gouging, and the new normal of supporting a remote workforce. 2020-05-1224 minDefrag ThisDefrag This64: How IT Can Enable a Remote WorkforceJason Rader, who is the National Director of Network and Cloud Security at Insight Enterprises, joins the podcast to discuss the issues and solutions of supporting employees who are working from home during the COVID-19 crisis. 2020-04-1421 minDefrag ThisDefrag This63: Managing eWaste in a Secure and Compliant MannerAsk any digital forensics team or security researcher, and they will agree that data that is seemingly wiped from a hard drive is not lost forever. John Shegerian, the co-founder of ERI, a leading eWaste company, discusses the implications of eWaste in terms of security and compliance. 2020-03-1123 minDefrag ThisDefrag This62: Why Cyber Hygiene is So ImportantDr. Arun Vishwanath, a technologist in the field of cybersecurity, joins the podcast to discuss what cyber hygiene is and why people don't treat it the same way as personal hygiene. How can we change how people perceive technology in a way that is secure?2020-02-2633 minAmericana Music ProfilesAmericana Music ProfilesFrances Mooney InterviewFrances Mooney has been playing bluegrass music for over 50 years - She joins me on this edition of Americana Music Profiles to talk about her interesting musical career and her new CD project, Wild and Free. Learn more about your ad choices. Visit megaphone.fm/adchoices2020-02-1224 minDefrag ThisDefrag This61: Defending Against Nation Sponsored AttacksCompanies who don’t have their systems up to date are to this day running into variants of WannaCry ransomware taking over business-critical systems. Most of these businesses are not even the intended target for these types of advanced persistent threats. So what do we know and how can we better protect ourselves from these attacks?2020-02-0519 minDefrag ThisDefrag This60: A Different Prespective on Shadow ITShadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark, hence the name. Often, when shadow IT happens though, it’s because IT is not allowing for fast workflows or certain operations are a hindrance to agility in the workplace. Uri Haramati joins the Defrag This podcast to discuss his take on shadow IT.2020-01-2422 minTechnado (Archived)Technado (Archived)Technado, Ep. 135: Progress’ Greg MooneyOn this week’s episode, the team is joined by Greg Mooney from Progress, the company behind products like WhatsUp Gold and iMacros. Greg has an interesting background spanning marketing, engineering, and even IT security, and helped the team understand the implications of California’s CCPA law. In the news, the crew discussed Opera’s strange evolution from a browser to a predatory loan provider, a proof-of-concept exploit for the Microsoft-NSA crypto bug, and a list of the evilest companies around. Unsurprisingly, it featured more than a few tech giants.2020-01-2300 minTechnadoTechnadoTechnado, Ep. 135: Progress’ Greg MooneyOn this week’s episode, the team is joined by Greg Mooney from Progress, the company behind products like WhatsUp Gold and iMacros. Greg has an interesting background spanning marketing, engineering, and even IT security, and helped the team understand the implications of California’s CCPA law. In the news, the crew discussed Opera’s strange evolution from a browser to a predatory loan provider, a proof-of-concept exploit for the Microsoft-NSA crypto bug, and a list of the evilest companies around. Unsurprisingly, it featured more than a few tech giants.2020-01-2351 minLiving In Carver County MinnesotaLiving In Carver County MinnesotaAndy Mooney owner of Red Bench Bakery in Chaska talks about local business.Andy Mooney has made a huge impact in downtown Chaska in a very short period of time with their Red Banch Bakery. It shows how accurate they were in their assessment that this was something the community needed and would support. Andy also discusses how they've expanded and what his outlook is for small businesses in small towns. He's bright and engaging and it was a fun interview.2020-01-0225 minDefrag ThisDefrag This59: Using Automation to Protect Your Business NetworksOn the phone today, we have someone who is helping IT and Security teams do just that. Alex Bauert has more than 25 years of IT experience, with 15 of those years spent in architecture and application security leadership roles. He has built and enhanced application security programs at several large and medium enterprises across various industries. In addition, Bauert is a localization and internationalization engineer for hardware and software products.2019-12-3017 minDefrag ThisDefrag ThisDefrag This: IT Horror StoriesIT professionals join the Defrag This podcast to tell the spookiest stories of their careers.2019-10-2826 minDefrag ThisDefrag ThisDefrag This: Information Governance Report by Osterman ResearchGreg Mooney and Jeff Edwards discuss a new report released by Osterman Research and sponsored by Progress about how Information Governance is often overlooked when it comes to IT operations cost savings.2019-09-1115 minDefrag ThisDefrag This56: MOVEit 2019.1 Dedicated Cloud2019-08-0710 minDefrag ThisDefrag This55: Data Collection and the Open Source Intelligence2019-08-0518 minDefrag ThisDefrag This54: Archiving Data Today and Into the Future2019-07-3112 minDefrag ThisDefrag This53: Big Business Facing GDPR Fines in the UK2019-07-2917 minDefrag ThisDefrag This52: EMA Report - Network Performance Management ToolsIn the case of network performance management, what are the most important metrics? Also, which tools are IT teams using to get this data to support the business infrastructure? The answer is “many” depending on who you ask.2019-07-1914 minDefrag ThisDefrag This51: Have You Met? QBITSIn this latest Have You Met? podcast series, Greg Mooney chats with Daniel Hotz about manage file transfer solutions and how QBits is implementing manage file transfer tools in Switzerland, Germany, and Austria.2019-07-1207 minDefrag ThisDefrag This50: Right and Wrong Way of Entering Infosec2019-06-1421 minDefrag ThisDefrag This49: Have You Met? L8 SolutionsIn this latest Have You Met? podcast, Greg Mooney chats with L8 Solutions on their continued success as an Ipswitch partner and how they are providing stellar IT solutions and services to their clients in the UK.2019-04-1614 minDefrag ThisDefrag This48: MOVEit Integration with Mulesoft2019-04-0820 minDefrag ThisDefrag This47: What is DevSecOps?2019-04-0817 minDefrag ThisDefrag ThisDefragging March 2019 We're bringing you March's security and IT news! 2019-04-0319 minDefrag ThisDefrag This46: How DevOps Teams are Using Network Monitoring ToolsIf your company isn’t developing software, just wait five minutes.   Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal use only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling.   All this development means having to create your own development operations team. Development Operations (DevOps) has brought IT operations and development teams a lot closer than ever before. Both sides are using network monitoring and other IT tools in some capacity, but...2019-03-1222 minDefrag ThisDefrag This45: Log Management Basics - What should You Collect?Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, why to focus on those logs and what specifically to look for. It’s a great answer to the sysadmin who sets up a Log Management solution, watches the logs roll in and then asks “Ok, so now what?”2019-02-1411 minDefrag ThisDefrag This44: 12 Years Later: How the TJX Hack Changed Security and ComplianceIn this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.        2019-02-1212 minDefrag ThisDefrag This43: AI vs Automation For SecOps TeamsAutomated systems are not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far reaching and it’s important to know the differences between AI and Automation. Security Operations teams, or SecOps, are increasingly using AI along with automation to tackle advanced persistent threats, but what are the differences?2019-02-0113 minDefrag ThisDefrag This42: State of GDPR and Brexit 2019 With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are left with little details as to how to navigate the minefield that is compliance. We talked to a lawyer who is an expert in GDPR compliance to learn more on how the GDPR is sizing up.      2019-01-3114 minDefrag ThisDefrag This41: What it's like to Start Your Own IT Website Well-known PowerShell expert and Ipswitch contributer Adam Bertram, AKA Adam the Automator, discusses leaving his day job to start Techsnips.io, an e-learning platform for IT professionals. 2019-01-2519 minDefrag ThisDefrag This40: State of Data SecurityEnterprise companies are coming under increasing scrutiny for their data security practices, or lack thereof depending on who you are talking about. Last month we looked at what transpired over the past year in data security news, but today we are going to take a look into the future of 2019.2019-01-2426 minDefrag ThisDefrag This39: Top 6 Data Breaches of 20182018-12-1522 minDefrag ThisDefrag This38: WhatsUp Gold Integration with Connected TAC2018-11-1220 minDefrag ThisDefrag This36: GDPR EffectivenessCybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far easier to get away with. The laws in place to help regulate society, such as Money Laundering and CCTV Regulations, just aren’t on the internet. That’s why at the end of the day, the internet is the New Frontier: It’s the Wild, Wild West, where the rules don’t apply. Luckily, a hero comes proverbially roaring in to save the digital-day! Chris Payne, Man...2018-10-1117 minDefrag ThisDefrag This35: Monitoring Security In AWSHow do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast. I recently got together with Will Bengtson, a security researcher with over a decade of experience in cybersecurity who works at Netflix. “The biggest thing for me is that we have a lot of accounts, a lot of instances, a lot of change in our environment. So monitoring for us has to be just a co...2018-10-1119 minDefrag ThisDefrag This34: API Security In The CloudToo many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security. Unfortunately, far too many are caught off guard when they learn that the security of these web services is limited. Yes, you are purchasing a service from them, but the truth is, IT security within a shared API is a shared responsibility. Brad Geesaman sees it far too often. He’s been in IT security and infrastructure for over 15 years, working with Symantec, Blackfin, and others. He’s worked as an ethical hacker, teaching others how...2018-10-1117 minDefrag ThisDefrag This33: Dark Web Traffic Analysis Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has no place on the company network. In this episode we talked with Mark Towler, Senior Product Marketing Manager at Ipswitch, and Jim Cashman, Principal Product Manager at Ipswitch and Product Owner of WhatsUp Gold, about the challenges of dark web traffic and how a new feature of WhatsUp Gold gives IT teams a tool to address this problem. 2018-08-2811 minDefrag ThisDefrag ThisPrepping For Black Hat And DEF CON2018-08-0517 minDefrag ThisDefrag This31: How to Prepare for a HIPAA AuditHow would you like to walk into an HIPAA audit? Most will go in wondering - or worrying - if the security measures in place reflect their company’s due diligence to protect their ePHI (electronic protected health information). Others will have the forethought to be proactive in their situation and know they have done what is necessary to protect the information for which they are responsible. We want you to be the latter.2018-07-3019 minDefrag ThisDefrag This30: California's New Consumer Privacy ActThe European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed its own group of privacy protection laws meant to protect California residents from the mishandling of their personal information. As companies like Facebook and Equifax who have been front and center for the mismanagement of personal information for millions of people, what do new privacy laws mean for individuals and businesses? In this episode Greg and Jeff speak with Kevin Conklin, the Head of Product Marketing at Ipswich, about the steps the...2018-07-1213 minDefrag ThisDefrag This29: What's the Necessary Experience For Entry-Level Cyber Security?In episode 29 of the Defrag This podcast, we consider what it takes to be a cyber security professional.2018-05-2335 minDefrag ThisDefrag This28: 3 Steps for Turning Cybersecurity Fears into an Action Plan w/ Paul McGoughDo the headlines about data breaches and information hacks have you worried, but you don’t know where to turn? If you’re afraid of having a cybersecurity “guru” take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.2018-05-2321 minDefrag ThisDefrag ThisDefragging April 2018We're bringing you April's security and IT news!2018-05-0316 minDefrag ThisDefrag This27: Going From Reactive mode to Predictive Mode with Connected TACHate seeing that troubleshoot error pop up? Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue. Reactive mode can be a stressful operation mode that no company wants to work in, but what if we can go from reactive to predictive mode.2018-05-0214 minDefrag ThisDefrag This26: What Can We Learn From the Iranian Phishing AttackAre you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information. Phishing attacks are becoming inevitable, but as a preventative measure - we need to learn what our risk factors are and make it harder for hackers to log into our accounts.2018-04-0722 minDefrag ThisDefrag This25: Shadow IT: Problems & SolutionsNothing frustrates and cripples IT more than individuals in varying departments going rogue. Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi off network. Sara from finance uses non-approved cloud storage for personal info of employees, exposing the data. Then Larry uses his own home laptop because the work computer has too many restrictions. All this and more causes headache after headache for IT. The problems abound, causing security threats and bogging down the IT department when they could be focused on bigger tasks? Two IT pros, Adam...2018-04-0716 minDefrag ThisDefrag ThisDefragging March 2018We're bringing you March's security and IT news!2018-04-0718 minDefrag ThisDefrag This24: Mythbusting the GDPR and PECRIn this one we do some mythbusting.2018-03-1326 minDefrag ThisDefrag ThisDefragging February 2018We're bringing you February's security and IT news!2018-03-0311 minDefrag ThisDefrag ThisDefragging January 2018We're bringing you January's security and IT news right as it happens!2018-02-0216 minDefrag ThisDefrag This23: Advantages to Python Networking for Automating Tasks w/ Eric ChouWith so many available languages, knowing which one to choose for automation can be overwhelming. In this interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.2018-01-3020 minDefrag ThisDefrag This22: Cryptocurrency Volatility and the Blockchain w/ Adam BertramThe cryptocurrency market is always changing. Is it a reliable investment, and who should be investing in it? In this episode Defrag This host Greg Mooney, and guest Adam Bertram, an IT industry expert, discuss the current cryptocurrency trend and what some of the downsides are to investing.2018-01-2312 minDefrag ThisDefrag ThisDefrag the Week of 1/7/18We're bringing you this week's security and IT news right as it happens!2018-01-0909 minDefrag ThisDefrag This21: Looking Back at 2017's Biggest Data BreachesIn this episode of Defrag This, we're looking back on the year.2017-12-2234 minDefrag ThisDefrag This20: 3 Things You Don’t Want to Forget While Prepping for GDPR w/ Paul VoigtNew regulations always mean a flurry of activity for affected companies, and the European Union’s new General Data Protection Regulation is no exception. The bill passed in 2016, but it gave companies two years to fall in line. That means the deadline of May 2018 is looming for companies with consumer data interests in the EU. Not making that deadline could mean fines and civil suits. And then there’s the possibility of cultivating a bad reputation for not caring enough about the protection of personally identifiable data of consumers.2017-11-2111 minDefrag ThisDefrag ThisIpswitch's Ribbon Cutting CeremonyOn this special episode of Defrag This, we're sharing the ribbon cutting ceremony for our new office. Hurray!2017-11-1608 minDefrag ThisDefrag This19: The 3 Wi-Fi (In)Security Protocols w/ Brad CallCan we ever be completely safe when it comes to wifi security? No. Cue the panic. Just kidding. We really can’t be 100% safe using wifi, but that doesn’t mean we should just throw caution to the wind and neglect any attempts at security whatsoever. There are security protocols available to help keep things more secure. But what are the differences and why do those differences matter? In this episode, Brad Call, wi-fi expert and consultant for Internal IT, gives us a breakdown of the three security protocols and how they...2017-11-1417 minDefrag ThisDefrag This18: The Great Cyber War w/ Mary ManjikianFake news had been all over the news for months. Some people don’t believe it’s a real thing, and others believe that it is lurking behind every meme and Facebook ad. As usual, the truth is somewhere in the middle.The recent senate hearings related to the possibility of Russian interference in the American election have shined an even brighter spotlight on this issue. Outside interference from other nations is very real. It’s not exactly a new issue, but as our technology continues to leap forward faster than legislation can pin it down...2017-11-0713 minDefrag ThisDefrag This17: PowerShell Vs. The World w/ Adam BertramInternet comment sections are often either amusing or horrifying places. There’s generally little in-between. This is particularly true in the computer programming world where some programmers can be almost slavishly devoted to their chosen deity… er… scripting language. Debates between users of different languages can be heated as everyone tries to defend their personal favorite as “the best.” It’s not necessarily clear what could objectively make one scripting language “better” than another overall, though. One language that gets more flak than it likely deserves is PowerShell. Proponents of Python can be especially brutal in their ridicul...2017-10-1015 minDefrag ThisDefrag ThisDefrag This - Cyber Security Update - Week 091017A weekly rollup of everything in the news relating to cyber security. Check in every week for breaking news in the cyber security spectrum. 2017-09-1302 minDefrag ThisDefrag This16: How to Help Users Stop Falling for Phishing Attacks w/ Arun VishwanathHave you ever had a doctor give you a pill to cure whatever ails you without first finding out what your symptoms are? Of course not. That would be unprofessional and reckless. Yet, that’s the equivalent of what many IT professionals are doing when they send their users training videos about how to avoid things like phishing scams. These videos or other one-size-fits-all anti-phishing training materials work to a point, but they aren’t nearly as effective as they could be with a little more understanding of the patient, erm, I mean, user. In...2017-08-2923 minDefrag ThisDefrag This16: How to Help Users Stop Falling for Phishing Attacks w/ Arun VishwanathHave you ever had a doctor give you a pill to cure whatever ails you without first finding out what your symptoms are? Of course not. That would be unprofessional and reckless. Yet, that’s the equivalent of what many IT professionals are doing when they send their users training videos about how to avoid things like phishing scams. These videos or other one-size-fits-all anti-phishing training materials work to a point, but they aren’t nearly as effective as they could be with a little more understanding of the patient, erm, I mean, user. In...2017-08-2223 minDefrag ThisDefrag This15: IoT in Healthcare: Endless Possibilities w/ Stephen WuThe healthcare industry is at a crossroads when it comes to technology. Mobile devices and the IoT has given new and innovative ways to stay on top of our health from Fitbits to smartphone pedometers, but the vast amount of data these apps collect on our health is a blessing and a curse. Stephen Wu, a technology lawyer at Silicon Valley Law Group and the author of A Guide to HIPAA Security and the Law, knows that if healthcare data is not handled properly, patients risk having their information lost or stolen, which means healthcare providers risk...2017-08-0113 minDefrag ThisDefrag ThisHow Not to Hate Video ConferencingIt’s the bane of our existence—after printers, that is. Today at Cisco Live with Ryan Lewis, we will be talking about video conferencing. As we all know, the IT guy is always working his butt off behind the scenes to make sure that video conferencing is working right for his clients and that they don’t have any hiccups when they’re giving an important presentation or running an important meeting. Lewis is going to tell us what he’s using for video conferencing, why he’s using it, and the challenges he’s overcome to...2017-07-2510 minDefrag ThisDefrag This14: NotPetya: Is it for the Money or the Infrastructure?As if doing taxes weren’t bad enough, now cybercriminals have used an update to a Ukrainian tax software to spread malware to computers in multiple companies both in Ukraine and around the world. The infectious code looks like the ransomware Petya at first glance, but after a double-take, it looks more like a malware that is decidedly more sophisticated and is definitely NotPetya. Many are comparing it more accurately to the WannaCry attacks in May. In this episode of Defrag This, Scott Foote, cybersecurity expert and CEO of Protinuum, dives deep on the recent Not...2017-07-1417 min