Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Cyber Security News

Security News & Information

×  

Follow This Show

Stay in the know about new episodes and updates.
This show discusses the social implications of various security technologies.

Upcoming Broadcasts

We lock our doors and windows of our homes. We put protective measures in place for our most valuable assets – family, possessions, and more. The same holds true for personal computers, large corporate networks and information in the cloud. Are these measures enough? Can we do more? Has your organization already been compromised? In order to access the "Dark Web", it takes specialized software as well as a highly specialized browser. This is where illicit and illegal activities occur. In fact, after a Cyberattack has been launched towards an organization and the confidential information/data has been hijacked, this is the first place where it will go to so that the Cyberattacker can make a rather lucrative profit. Of course, we hear about these Security Breaches and Data Leakage occurrences on a daily basis, but how do you know if your confidential information and data has not been hijacked and not sold on the Dark Web? How do you know if somebody is actually tracking your every movement on the Internet and you know nothing about this? Are you afraid that you may become a victim of Identity Theft? In this interview we have the honor of interviewing Greg Spicer, the Chief Revenue Officer of Braintrace. Not only do they offer a myriad of Cybersecurity services, but one their main ones is that of protecting you from the deep and evil trenches of the Dark Web. Dial in today and learn how you can avoid from being the next target of ID Theft!!!
  • by Cyber Security News
  • in Technology
  • 01:30
Reminder Edit Reminder

On-Demand Episodes

In today's society, we are seeing an explosion in the trend of where devices that we use both in our professional and personal lives are literally becoming intertwined and connected amongst one another. A good example of this is our... more

Hello, and welcome to our new brand-new series of podcasts in 2019!!! As we all know, the Cyberthreat landscape is expected to get much more complex, covert, and even stealthier now than it ever has before. We are seeing Cyberattackers... more

For many IT Security teams of today, there is a lot of information and data that is literally being throw at them, all at once. For example, there are the myriads of intelligence that they have to parse through on a daily basis. This includes... more

Today on the podcast we speak to Tianyi Lu, Chief Architect of VirtualArmour. VirtualArmour is a global cybersecurity and managed services provider that delivers customized solutions to help businesses build, monitor, maintain and... more

In the world of Cyber security, being proactive is a must. Having this mindset means that you are one step ahead of the proverbial cat and mouse game. But to achieve this, it takes a combination of the right kind of technology and people.... more

When a business or a corporation acquires security-based solutions, whether it is in terms of hardware or software, many of them come ?out of the box?. This means that the IT Security staff is tasked to configure it all from the ground up,... more

Let's face it, the IT Security staff of businesses and corporations are over taxed today. Not only do they have to combat the Cyber threats that occurring today, but they have to keep up with the constant scramble of patches, software updates,... more

In today's Cyber security world, the landscape is changing on a daily basis. It seems like that hardly you have addressed one issue, there are literally 10 more which come up right after that. How is your staff supposed to keep up with all of... more

In today's Cyber security world, there is a tendency for businesses and corporations to spend money on the latest security tools in order to beef the lines of defense that protect their network infrastructure. But, is this money... more

If you think about it, what is one of you most valued possessions? Your car? Your house? Your savings? You've probably answered yes to all three. But have you given thought about your wireless device, especially your Smartphone? This tool... more

Comments

 comments