Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Sql Injection Podcasts
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading

1
SQL Injection to RCE: Fortinet's Critical Vulnerability Exposed | The AppSec Insiders Podcast Ep. 17
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31On this episode of The AppSec Insiders Podcast, we dive into CVE-2025-25257, a Fortinet FortiWeb Fabric Connector SQL injection vulnerability that escalates to RCE. We break down how this exploit works, why it’s so impactful, and what lessons organizations can learn, from proper network segmentation to the importance of SAST in your pipeline. We al…
…
continue reading

1
Executive IT – Why Proactivity Pays in IT & Security with Maxio’s COO Alan Taylor, E06
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14In this episode of Executive IT, host Evan Kiely sits down with Alan Taylor, COO of Maxio, to explore how IT and security shape business reliability, compliance, and growth. Alan shares his perspective as a seasoned operator in private-equity backed SaaS companies, covering: Why IT and security are non-negotiable investments for scaling businesses …
…
continue reading

1
Automox Insiders – Switching Classrooms: Katie Bleichman on Redefining Her Career Path, E19
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode of Automox Insiders, host Maddie Regis sits down with Katie Bleichman, Director of CX Operations and Enablement at Automox. Katie shares her inspiring journey from two decades in elementary education to leading customer experience in the SaaS and cybersecurity world. Discover how skills from the classroom translate into IT, what it …
…
continue reading

1
CISO IT – Great Security Begins with Great IT, E11
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
…
continue reading

1
Patch [FIX] Tuesday – September 2025: [Hyper-V on the Hot Seat, Phone Link Priv-Esc, and NTFS RCE], E23
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Stay ahead of September 2025 Patch Tuesday. Automox experts Ryan Braunstein, Henry Smith, and Seth Hoyt break down three high-impact items you need to act on now: Hyper-V privilege escalation, XAML/Phone Link elevation paths, and an NTFS remote code execution. You’ll get: Clear patch priorities and timing. Likely attack paths and real-world detecti…
…
continue reading

1
Hands-On IT – Building Blocks of IT: From Problems to Solutions pt. 2, E21
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58In the second half of this crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado shift from defining IT problems to actually building, testing, and refining solutions. They dig into choosing the right tools without getting lost in endless options, the value of learning from APIs and documentation, and why “don’t rei…
…
continue reading

1
Automate IT – Building Blocks of IT: From Problems to Solutions pt. 1, E18
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this special crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado dive into the building blocks of IT solutions. They share practical ways to approach automation without the overwhelm—starting from defining real-world problems and breaking them into manageable steps. Along the way, they explore Linux as a proble…
…
continue reading

1
Ep. 12 – Timing Attacks & Mobile OAuth Hijack: When Microseconds and Misflows Betray You
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
Autonomous IT, Live! – 3 Ways to Make Your Path to Director of IT Less Scary
42:28
42:28
Play later
Play later
Lists
Like
Liked
42:28It’s not just a show, it's a lifeline for how to unscary a seemingly daunting career journey – no matter where you're at in your IT or security hustle. From super-talented IT cartoonist and influencer marketing service agency co-owner, Forrest Brazeal, and gifted Automox VP of Customer Experience, Charles Coaxum, to the sagely verbose CISO and VP o…
…
continue reading

1
Automate IT – Building Resilient IT Teams and Solutions, E12
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of resilience and adaptability in the IT field as we enter 2025. He emphasizes the need for personal and team resilience, effective communication, and the ability to learn from setbacks. The conversation covers practical steps for achieving IT resilience, includin…
…
continue reading

1
CISO IT — Hacker Summer Camp 2025: A Recap of Black Hat & DEF CON, E19
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, p…
…
continue reading

1
Patch [FIX] Tuesday – August 2025: [Crafted Files, Spoofed Certs, and Good Ol' SQL Injection], E22
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Join Automox cybersecurity experts Ryan Braunstein and Mat Lee for August 2025’s Patch [FIX] Tuesday, covering a Hyper-V privilege escalation, an Azure Virtual Machines spoofing flaw, and four serious SQL Server vulnerabilities. Learn how attackers could chain virtualization and cloud exploits, why crafted VHDX files and spoofed certificates are da…
…
continue reading

1
Hands-On IT – The State of IT Careers and the Role of AI with Forrest Brazeal, E11
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44In this episode of Hands-On IT, host Landon Miles sits down with special guest Forrest Brazeal to explore the current state of IT careers and the evolving role of AI in the tech landscape. As a renowned cloud architect and co-founder of Freeman and Forrest, Forrest shares his insights on upskilling for today’s competitive job market, the real impac…
…
continue reading

1
Automox Insiders – Curiosity, Adaptability, and Career Growth with Ryan Jeziorski, E13
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39In this episode of Automox Insiders, Maddie Regis speaks with Ryan Jeziorski, a Solutions Engineer at Automox, about the importance of IT adaptability and resilience. Ryan shares his diverse career background, his current role at Automox, and insights on how organizations can maintain uninterrupted services while adapting to changes in technology. …
…
continue reading

1
Automox Insiders – By Your Command: The Cybersecurity Directive with Tom Bowyer, E10
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07Maddie Regis speaks with Tom Bowyer, Director of Security at Automox, about the intersection of IT and cybersecurity. Tom shares his career journey, the importance of collaboration between IT and security teams, and insights into SOC compliance reports. He emphasizes the need for transparency, experimentation, and proactive problem-solving in enhan…
…
continue reading

1
Hands-On IT – A Prompt Engineering Deep Dive with Henry Smith, E20
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04In this episode of Hands-On IT, host Landon Miles is joined by Automox Security Engineer Henry Smith for a deep dive into prompt engineering and how it’s transforming the way IT and security teams work with AI. From crafting high-quality prompts to auditing and hardening code using large language models like Claude and ChatGPT, Landon and Henry sha…
…
continue reading

1
Prompt Injection to RCE: When AI Gets Compromised | The AppSec Insiders Ep.16
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29In this episode, we unpack CVE-2025-49596, where prompt injection, CSRF, and localhost access were chained to achieve RCE in the MCP Inspector AI tool. Learn how the exploit worked, what it reveals about LLM security risks, and how to defend against similar threats with sandboxing, access controls, and DevSecOps monitoring.…
…
continue reading

1
Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
…
continue reading

1
Product Talk – Alerting, Scheduling, and Smart Decisions, E19
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Discover how Automox is transforming IT reporting. In this episode, Steph Rizzuto talks with product lead Emily Pace and engineer Ben Glass about new reporting features that give you real-time visibility, alerting, and automation. Learn how IT teams are cutting reporting time from 30 hours to 1, setting up custom alerts, and making smarter decision…
…
continue reading

1
Heroes of IT – Sleeping Easier: Milton Webster’s Story of Risk Reduction with Automox, E18
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50In this episode of Heroes of IT, Ashley sit down with Milton Webster to explore how his team transformed their IT operations using Automox. From reducing endpoint risk scores in record time to implementing automated Windows 11 upgrades with Worklets, Milton shares real-world wins and challenges from the frontlines of IT. Learn how a culture of proa…
…
continue reading

1
Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in. Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider.…
…
continue reading
In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn’t a cautionary tale against automation but a clear cal…
…
continue reading

1
Automox Insiders – Customer Experience by Design: A Conversation with Kat Breeggemann, E18
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29In this episode of Automox Insiders, host Maddie Regis sits down with Kat Breeggemann, Digital Customer Experience Manager at Automox, to explore her unique journey from journalism and communications into the world of customer success. Kat shares how a leap-of-faith internship opened the door to a career in CX, the pivotal moment she advocated for …
…
continue reading

1
Patch [FIX] Tuesday – July 2025: [BitLocker Attack, Secure Boot Expiry, Linux chroot+sudo privesc, and Malicious .Zips], E21
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29In this July 2025 Patch [FIX] Tuesday episode, Automox security experts Tom, Seth, and Cody unpack four high-impact threats — from Microsoft updates, to Linux vulns, and .zip exploit PoCs. Topics include a physical attack method bypassing BitLocker encryption (CVE-2025-48001), the looming expiration of secure boot certificates, a Linux privilege es…
…
continue reading

1
Executive IT – The Art of Procurement: You Don’t Get What You Deserve — You Get What You Negotiate, E02
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53In this episode of Executive IT, host Evan Kiely and guest JB Snodgrass discuss the intricacies of procurement processes, effective negotiation strategies, the importance of timing and communication, and common pitfalls to avoid when evaluating tools. JB shares insights from his extensive experience in procurement, emphasizing the need for thorough…
…
continue reading

1
Automate IT – The Human Side of IT: A Toast to Sysadmins, E17
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08With a newborn at home and fueled by coffee (and Linux), Jeremy reflects on what it means to support both technology and people. In this episode, Jeremy tackles some of IT’s toughest challenges — maintaining balance, fostering gratitude, and safeguarding your mental health. Whether you’re rebooting servers at 2 am, automating backend workflows, or …
…
continue reading

1
Heroes of IT – Optimizing IT Workflows with Automox: Insights from Steve Engler, E06
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Ashley sits down with Steve Engler from the Oklahoma Farm Bureau to explore his journey from taking apart his first computer to becoming a certified Automox expert and system admin. Stephen shares how he: Transitioned from the Air Force into IT Unlocked the full potential of Automox in a previously underused environment Built a hands-on lab to test…
…
continue reading

1
Ep. 10 – Cookie XSS & Image Upload RCE: One Cookie, One File, Full Control
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
…
continue reading

1
Product Talk – Procrastinators, Rejoice: Making the Windows 10 to 11 Migration Manageable, E18
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31Ready or not, Windows 11 is here. In this episode of Product Talk, Peter and Steph break down how IT teams can simplify the Windows 10 to 11 migration — without disrupting users or pulling all-nighters. From Worklets for readiness checks and silent upgrades to insights on hardware eligibility and inventory improvements, learn how to take control of…
…
continue reading

1
Automox Insiders – Ted Harapat, Tales of the Linux Firefighter, E03
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49In this episode of IT Insiders, host Maddie Regis sits down with Ted Harapat, Senior Systems Engineer at Automox, for a candid and compelling look into the world of Linux, cybersecurity, and the origins of IT careers. Ted shares how a midnight knock on his window sparked a decades-long journey into IT, what it’s like to support and expand Automox’s…
…
continue reading

1
Executive IT – Balancing Security, Usability, and Speed | E05
17:45
17:45
Play later
Play later
Lists
Like
Liked
17:45How can IT and the business work better together—without sacrificing speed, security, or sanity? In this episode of Executive IT, host Evan Kiely is joined by Volker Otto, a seasoned IT executive, to explore how teams can bridge the gap between user experience and technical requirements. They dive into the rise of business relationship managers, ma…
…
continue reading

1
Hands-on IT – Fostering Creativity in IT: Listen Monkey, Listen. E08
23:13
23:13
Play later
Play later
Lists
Like
Liked
23:13In this episode, Landon Miles interviews Jon Levenson, the manager of content and community at Automox, about the importance of creativity in IT and how to foster a creative environment. Jon shares his background as a former actor and how he fell into tech, as well as his experience in copywriting and podcast writing. They discuss the key elements …
…
continue reading

1
Patch [FIX] Tuesday – June 2025: [WebDAV Attacks, SSH Hijacks, and macOS Sandbox Escapes], E20
17:08
17:08
Play later
Play later
Lists
Like
Liked
17:08June’s Patch [FIX] Tuesday unpacks a lighter-than-usual Windows patch cycle — but don’t get too comfortable. Join Automox cybersecurity experts as they break down high-risk vulnerabilities across macOS and Windows, including: A chained SSH vulnerability (CVE-2025-26465 & CVE-2025-26466) that allows memory exhaustion and bypasses host key verificati…
…
continue reading

1
Hands-On IT – Making End Users Happy (and Maintaining Your Sanity), E19
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Is tech easier than people? For many IT pros, the answer is a resounding yes. In this episode, Landon Miles tackles one of IT’s biggest challenges: managing user expectations while maintaining your own mental wellbeing. You’ll learn how to balance empathy with efficiency using proven frameworks like ITIL, SRE, and the NIST Cybersecurity Framework. …
…
continue reading

1
Automate IT – 5 Steps to Effectively Communicating with Your Executive Team, E13
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of engaging with executive teams and the necessity of clear communication within organizations. He emphasizes the value of understanding team dynamics, preparing effectively for discussions, and aligning goals with organizational priorities to foster collaboration…
…
continue reading

1
Ep. 9 – Directory Traversal & LFI: From File Leaks to Full Server Crash
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single…
…
continue reading

1
CISO IT – RSA 2025: Identity Is the New Threat Vector, E19
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12RSA 2025 revealed a shift: identity is now a primary threat vector in cloud security. In this episode, Jason Kikta breaks down the key takeaways from the conference—why identity has overtaken malware, how threat actors exploit service accounts and IDPs, and what this means for modern defense strategies. Plus, Jason shares observations on the evolvi…
…
continue reading

1
Product Talk – Simplified Patch Tuesday Scheduling & Beta Channel Controls, E17
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28In Episode 17 of Product Talk, Peter Pflaster and Steph Rizzuto walk you through the latest enhancements in the Automox console that help you work smarter — not harder. Discover how the new Agent Configuration settings let you choose between stable and beta release channels, control auto-upgrades, and manage endpoint behavior — all without submitti…
…
continue reading

1
Hands-On IT – 3 Tips to Make Your Endpoint Data Work for You, E18
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42In this episode of Hands-On IT, Landon Miles shares 3 tactical tips to help you make smarter decisions with your endpoint data. Learn how to cut through alert fatigue, streamline your reporting, and use historical insights to predict and prevent future issues. Whether you're managing a few hundred devices or thousands across mixed OS environments, …
…
continue reading

1
Automox Insiders – Data Trivia and Endpoint Truths, E17
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15In this episode of Automox Insiders, host Maddie Regis sits down with Peter Pflaster and Kelly Carlson from Automox’s product marketing team to explore how data transforms endpoint management. From mean time to remediate (MTTR) to device compliance and unexpected user activity trends, they break down the metrics IT pros should watch — and why clear…
…
continue reading

1
Executive IT – The Gatekeeper Myth: Why Procurement Is Your Biggest Ally, E04
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Procurement is no longer just a gatekeeper — it’s a strategic driver in IT and security decisions. In this episode of Executive IT, host Evan Kiely sits down with Courtney Adams, a veteran procurement leader, to explore how smart procurement empowers better, faster, and more secure tech investments. From understanding true cost drivers to leveragin…
…
continue reading

1
Patch [FIX] Tuesday – May 2025: [Please Don’t Click That. Experts Review New Threats], E19
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Mayday. Mayday. May Patch Tuesday? This month’s episode dives into four key Windows vulnerabilities you need to address — from scripting engine memory corruption in legacy Internet Explorer components to remote code execution risks in Remote Desktop and Visual Studio. Ryan Braunstein and Mat Lee unpack what each CVE means for your environment, how …
…
continue reading

1
Autonomous IT, Live! – Spring Into Automation: Clean Up Tech Debt & Refresh Your IT Operations, E03
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18In this episode of Autonomous IT, Live!, Landon Miles hosts leads a three-part discussion focused on spring cleaning your IT systems, workflows, and personal well-being. You’ll hear candid, practical insights from IT professionals tackling burnout, technical debt, and infrastructure hygiene head-on. This live show originally aired April 16, 2025 💼 …
…
continue reading

1
Teach IT – MFA Essentials: A Quick Guide for Everyone, E03
2:30
2:30
Play later
Play later
Lists
Like
Liked
2:30Think your password is enough? Think again. In this episode of Teach IT, we break down what multi-factor authentication (MFA) really is — and why it’s one of the smartest ways to secure your accounts. You’ll learn how MFA works, the difference between SMS codes, authenticator apps, biometrics, and physical security keys, and why phishing-resistant …
…
continue reading

1
Automate IT – Beyond the Spreadsheets: Asset Intelligence & Risk Scoring, E16
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey in…
…
continue reading

1
Hands-On IT – 9 Essential Spring Cleaning Tips for IT Pros, E17
9:12
9:12
Play later
Play later
Lists
Like
Liked
9:12Spring is in the air, and it’s time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups,…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
Automox Insiders – Tidy Endpoints, Tidy Mind: Spring Cleaning with Adam Whitman, E17
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22In this episode of Automox Insiders, host Maddie Regis chats with Adam Whitman, Manager of Solutions Engineering at Automox, about all things IT spring cleaning. From patch management and software audits to business continuity planning and endpoint hygiene, Adam shares practical, real-world tips for tidying up your tech stack and staying ahead of I…
…
continue reading

1
Heroes of IT – Casey Merritt’s Patch Playbook at Right! Systems, E17
14:52
14:52
Play later
Play later
Lists
Like
Liked
14:52In this episode, Ashley chats with Casey Merritt from Right Systems about how he manages patching and automation across both internal systems and MSP clients using Automox. Casey shares how he transitioned into IT, took ownership of Automox at his company, and now uses Worklets to streamline software removal, automate reporting, and reduce onboardi…
…
continue reading

1
Executive IT – Legal’s View on Tool Consolidation: Spring Cleaning Your Tech Stack, E03
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15Is your tech stack getting out of hand? In this episode, Automox General Counsel Paul Shoning joins Evan Kiely to unpack the legal and strategic risks of IT tool consolidation. From budgeting overlap to vendor lock-in, learn how to clean up your stack without making a mess.By Automox
…
continue reading