Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Endpoint Protection Podcasts
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading

1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading

1
IT Lifecycle Management: The Foundation of Secure Operations
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:1540% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
…
continue reading

1
From Detection to Action: How SOAR Stops Cyberattacks in Minutes
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
…
continue reading

1
Why SIEM and Threat Detection Are Foundational for SMB Cybersecurity
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
…
continue reading

1
How MXDR Protects SMBs from Cyber Threats
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:2760% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
…
continue reading

1
Zero Trust SaaS Security: Protecting Your Apps, Identities, and Devices
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
…
continue reading

1
How Network as a Service (SASE) Empowers Mid-Market IT Leaders
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
…
continue reading

1
How to Prepare Your Business for the End of Windows 10
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
…
continue reading

1
Welcome to Perimeter Perspective: Expanding the Boundaries of Cybersecurity and IT
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
…
continue reading

1
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust in…
…
continue reading

1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading

1
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
…
continue reading

1
The Security Sandbox | Modernizing Cyber Risk Management in OT
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
…
continue reading

1
The Security Sandbox | Evolving Endpoint Security in OT
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
…
continue reading

1
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
…
continue reading

1
People-Centric Protection Against Evolving Cyber Threats
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection. This lively di…
…
continue reading

1
Transform Endpoint Data Security with People-Centric Protection
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16In a digital era where endpoints are the frontline defence against cyber threats, this first episode of our podcast series, "Insider Insight: Navigating Endpoint Security, Carl Leonard, Proofpoint’s Cybersecurity Strategist for EMEA, explores the transformative power of people-centric protection in the realm of endpoint data security. Join us as we…
…
continue reading

1
Episode 39 - GenAI and guidance to cyber security practitioners
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker?…
…
continue reading

1
BigFix Insider Interview: Michelle McGough, BigFix Technical Engagement
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43Michelle McGough makes a triumphant return to the BigFix team, talks about her path to BigFix, what she loves about the BigFix community and what her current focus is with respect to customer events and other things BigFix! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
…
continue reading

1
BigFix Product Launch: BigFix User Workspace
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24We've released a brand new product - BigFix User Workspace! In this episode, we're speaking with Mike Gare, BigFix Product Manager for BigFix Lifecycle and Workspace, and Jason Cordell, BigFix Technical Advisor to learn all about this exciting new offering. This digital workspace management solution improves employees experience, reduces helpdesk c…
…
continue reading

1
BigFix Best Practice Series: Client Settings 301 – Client Settings 301 – Business Use Cases Where You Just Need More
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the third episode of our BigFix Best Practices series on Client Settings, Client Settings 301. In this episode, we’re going to outline some business use cases we’ve encountered in the real worl…
…
continue reading

1
Episode 38 - RSA Conference Innovation Sandbox 2023
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03The RSA Conference Innovation Sandbox is an annual competition that showcases the latest and most innovative cybersecurity startups and emerging technologies. Cybersecurity professionals can learn a lot from security innovations showcased at events such as the RSA Security Conference.
…
continue reading

1
BigFix Best Practice Series: Client Settings 201 – Managing Client Settings Effectively
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the second of our BigFix Best Practices series on Client Settings, Client Settings 201. We talk about the actual practices you’ll need to understand to effectively manage client settings across…
…
continue reading

1
BigFix Best Practice Series: Client Settings 101 - Client Settings & Why You Should Care About Them
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This episode is focused on a key piece of the BigFix capability – client settings. Client settings sit at the heart of how the BigFix agent behaves and the actions that are taken on the endpoint, relay…
…
continue reading

1
Iain Smith: Unified Communications & the pace of AI | Cloud Conversations Ep 71
1:02:11
1:02:11
Play later
Play later
Lists
Like
Liked
1:02:11Iain Smith is a 9 time Microsoft MVP and a much respected figure in the field of Unified Communications. Iain joins Azure and Peter on the show this week where we discuss:• The history of UC, from MSN Messenger & Sync, to MS Teams• The current state of play with Teams from a UC viewpoint• His thoughts on what's next• AI, is the current pace of prog…
…
continue reading

1
Katie McMillan: Information Security vs legacy technology, & mentoring | Cloud Conversations Ep 70
59:37
59:37
Play later
Play later
Lists
Like
Liked
59:37Katie McMillan joins Kat and Peter on the show this week. Katie is a rising star in the tech community and specialises in Information Security across all platforms but with a more recent focus on Microsoft. In addition to being an inspiring mentor, Katie is also a passionate advocate for women in the tech industry and is a TechWomen100 Winner - 202…
…
continue reading

1
Fabian Bader: Protecting Azure AD hybrid identity and Defender | Cloud Conversations Ep 69
1:08:37
1:08:37
Play later
Play later
Lists
Like
Liked
1:08:37Fabian Bader MVP joins Ru Campbell MVP to talk about… • Changing tactics to protect domain controllers and on premises Active Directory • Defender for Identity as part of your hybrid identity security • Why FIDO2 is critical and a level up compared to traditional MFA • The intricacies of Defender for Endpoint exclusions and tamper protection Connec…
…
continue reading

1
Defender for Endpoint In-Depth | Cloud Conversations Ep 68
1:22:06
1:22:06
Play later
Play later
Lists
Like
Liked
1:22:06Paul Huijbregts, Justen Graves, and returning guest Joe Anich join Ru Campbell MVP to talk about Microsoft Defender for Endpoint (MDE) In-Depth, their new book, which offers a comprehensive guide to building a deeper understanding of Defender for Endpoint, its capabilities, and successful implementation. We talk about • Defender for Endpoint produc…
…
continue reading

1
ChatGPT, Community, and Viva Explorers | Merethe Stave | Cloud Conversations Ep 67
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53In this weeks episode, Microsoft MVP, and Senior Cloud Architect at Cloudway, Merethe Stave joins Femke and Peter to discuss: • ChatGPT • Viva Explorers • Working at Cloudway • Tech Community events in Norway • And much more Connect with Merethe online: LinkedIn: https://www.linkedin.com/in/merethest... Twitter: https://twitter.com/MeretheStave…
…
continue reading

1
SC-100 Exam Guide & working with Multi-cloud solutions | Dwayne Natwick | Cloud Conversations Ep 66
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35In this weeks episode, Microsoft MVP Dwayne Natwick returns to the show. Dwayne joins Ru and Peter to discuss: • Working with multi-cloud solutions • His new SC-100: Microsoft Cybersecurity Architect exam guide • Changing to the new Microsoft MVP security category • And much more Connect with Dwayne online: LinkedIn: https://www.linkedin.com/in/dna…
…
continue reading

1
BigFix Training News: BigFix Certifications are Here!
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Join us for some exciting news for you #BigFixers out there - the BigFix Certifications Program has returned! Join James and Rhonda as they speak with Kathy Nguyen, lead for BigFix Technical Enablement, as she discusses the process we've followed to get here and all the things YOU need to know in order to prepare and sign up for the newly released …
…
continue reading

1
BigFix Insider Interview - James Stewart, BigFix Automation Engineer
1:10:16
1:10:16
Play later
Play later
Lists
Like
Liked
1:10:16James Stewart, or JGStew as he's known on the BigFix Forum, Endpoint Management Today podcast co-host and overall jack of all trades details his journey to BigFix, how a game called Arctic Mud helped him with his typing skills, and tells us what House Robots are. Some links from this episode... Browser, Flash, Java Analysis for Windows Arctic Mud W…
…
continue reading

1
Empowering Cloud, Unified Comms & Microsoft Teams | Tom Arbuthnot | Cloud Conversations Ep 65
41:16
41:16
Play later
Play later
Lists
Like
Liked
41:16Tom Arbuthnot is a Microsoft MVP, a Microsoft Certified Master, and Co-Founder of Empowering.Cloud. Tom joins Peter on the show this week to discuss: • Unified Communications • The evolution to Teams from Lync and Skype for Business • His career journey • Co-Founding Empowering.Cloud • The importance of community • Work/life balance • Education • A…
…
continue reading

1
Physical computing with Power Platform | Eswar Prakash | Cloud Conversations Ep 64
1:11:28
1:11:28
Play later
Play later
Lists
Like
Liked
1:11:28Eswar Prakash is a Technical Development Lead in Power Platform at Resonate. Eswar joins us on the show this week to chat with Azure and Peter to discuss: • Unified Communications • Power Platform • Early computers • Mathematics • Internet of Things • His passion for Science Fiction • His love of food • And more Connect with Eswar online: LinkedIn:…
…
continue reading

1
Favourite Teams features, & Teams governance | Femke de Vroome | Cloud Conversations Ep 63
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06Femke de Vroome is a Productivity Engineer at Wortell. Femke joins us on the show this week to chat with our very own Femke Cornelissen - also now of Wortell (The Femke's of Wortell), and Kat Beedim to discuss: • Women in tech • Unconscious bias • Simplifying the Teams governance customer journey • Governance vs control • Should Teams Premium be in…
…
continue reading

1
What is Incident Response? | Nozomi Networks
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incid…
…
continue reading

1
What is Threat Detection? | Nozomi Networks
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further. Learn more with Nozomi Networks Cybersecurity…
…
continue reading

1
What is Cyber Risk Management? | Nozomi Networks
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou. Visit Our Website Follow Us on Link…
…
continue reading

1
What is Zero Trust Security? I Nozomi Networks
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design appr…
…
continue reading

1
BigFix Insider Interview - Rhonda Studnick Kaiser, Director of Customer Experience
48:58
48:58
Play later
Play later
Lists
Like
Liked
48:58Rhonda Studnick Kaiser, Director of Customer Experience for BigFix, talks about nearly every topic under the sun, what it's like to be a native Oregonian, and why she came to BigFix and why she loves to advocate for BigFix customers so much! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
…
continue reading

1
Careers in tech, and 12 tips at Christmas | Will Rowe | Cloud Conversations Ep 62
52:01
52:01
Play later
Play later
Lists
Like
Liked
52:01Will Rowe is a well known figure in the Microsoft community and is Director at MS Talent, which he has built to work with and place people with the right skills in fantastic roles working for amazing companies, usually industry-leading Microsoft Gold Partners. Will joins us on the show this week to chat with Femke and Peter to discuss: • Launching …
…
continue reading

1
Viva Explorers, Travel and Flying planes | Ana Inés Urrutia | Cloud Conversations Ep 61
1:03:48
1:03:48
Play later
Play later
Lists
Like
Liked
1:03:48Ana Inés Urrutia joins us this week to chat with Azure and Peter about travel, and her career with Dynamics 365 and Human Resources. We also chat about: • Fashion • Flying planes • The Viva Explorers • And much more! Connect with Ana online: https://twitter.com/AnaInesUrrutia https://www.linkedin.com/in/anainesurrutia/ https://www.anainesurrutia.co…
…
continue reading

1
BigFix Insider Interview - John Golembiewski - Director of Engineering and Tech Services for BigFix
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51John Golembiewski, Director of Engineering and Tech Services for BigFix, joins us in this episode to tell us how he ended up at BigFix, what he thinks is the greatest feature of the tool, and shares his special apple pie recipe! Resources Episode 2 - What is BigFix Again? John's Apple Pie store bought pie crust - don't mess around with this... 1/3 …
…
continue reading

1
The Pathfinders Power Platform Community | Meron Gebremedhin | Cloud Conversations Ep 60
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00Meron Gebremedhin joins us this week to chat with Azure and Peter about her journey into tech, working across the Power Platform and Cyber Security. We also chat about: • Mentorship • Certifications • The Pathfinders Power Platform Community • And much more! Connect with Meron online: https://twitter.com/Blacklionm1 https://www.linkedin.com/in/mero…
…
continue reading

1
Season 3 - Launch Show | Cloud Conversations | Ep 59
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29After a bit of a break, Cloud Conversations is back with new content and a brand-new member of our hosting team, Femke Cornelissen. We are absolutely thrilled that Femke has agreed to join us and hope you will join us in giving her a very warm welcome. In this episode, we also chat about: • What we've all been up to • The importance of taking time …
…
continue reading

1
BigFix Product Launch - Expanded BigFix Software Catalog
16:02
16:02
Play later
Play later
Lists
Like
Liked
16:02There's an exciting new feature that was launched in December 2021 which has been flying a bit under the radar. We've added a whole new suite of extended software patching content for Windows devices. In this episode, James Stewart, John Golembiewski and Rhonda Studnick Kaiser discuss how this new content came about, what it offers, how to get it a…
…
continue reading

1
Cloud Conversations at the South Coast Summit, plus our MS Ignite highlights!
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30In our latest episode, the Cloud Conversations team attend the South Coast Summit in Southampton, UK, and Ru and Peter actually meet in person for the first time. We discuss our conference highlights and also dive into the Ignite Book of News for a bit of a review and pick out some of our favourites. Follow us on Twitter: Azure: https://twitter.com…
…
continue reading

1
BigFix Insider Interview - Dan Wolff - Director of Product Marketing for BigFix
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24Dan Wolff, Director of Product Marketing for BigFix, joins us to describe his journey from a role as a mechanical engineer, developing computing hardware to his role with BigFix, the value of BigFix in an organization, the intersection between IT Operations and Security, and why he'd rather be backpacking rather than doing tech things when not focu…
…
continue reading