• 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:18

    Episode 1: Clash Of Clans Vs. Game Of War

    in Entertainment

    They are two of the most popular apps on the internet today and they are going to enter the steel app cage and fight it out until only one app remains!


    Will it be Clash Of The Clans?


    Will it be Game Of War?


    Find Out Live Tonight On App Or Crapp?!


    Hosted by the father and son team of Kyle O. and Dylan O. ( Possibly Joined By Abby O!

  • 00:24

    Waheed Subhani discusses RAPITOW app on #ConversationsLIVE

    in Motivation

    Host Cyrus Webb welcomes Waheed Subhani, founder of the Rapitow app, to #ConversationsLIVE to discuss not just how it is designed to deliver assistance to stranded motorists but how the word-of-mouth and social media has helped spread the word.

  • 01:02

    Sterling's New App....the 411 !!!

    in Health

    Sterling's new application to read the 23 and me raw data is now available. On Monday, February 16, 2015 at 8 PM Eastern Dr. Jess Armine will interview IT guru Peter Santamaria who is the IT support for sterling's new application.


    The new app is 50 pages in length and encompasses 825 polymorphisms together with biochemical pathway drawings and an advanced method of searching for polymorphisms that are of interest. This app is the premier application on the market today.


    Pete will explain how to download your raw data from 23 and me, explain how to obtain your genetic polymorphisms from this new app and all the features of this new application like being able to search polymorphisms via conditions (autism, MCAD, ADD, etc.) or by SNP and how to use the biochemical pathway drawing provided.


    Pete will explain the technicalities of the new app and Dr. Jess Armine will be on hand to explain any clinically related questions.


    Remember, you can get the new application by going to mthfrsupport.com and if you use the promo code "NewReport" you can save $20 on the price of the application. This promotion is good until February 22, 2015.


    Looking forward to having it explained and knowing all the functionalities of the new app myself!


    Dr. Jess :-)


     

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 00:28

    Data Security for Small Businesses and Franchises

    in Technology

    This week we'll discuss data security with John Martin and the team from First Watch Technologies!


    John will share best practices in keeping your brand and business safe from data breaches and other technology threats.  Join us Wednesday at 8pm ET! 


     


     

  • 00:35

    Information Security, Risk, and The Road Ahead

    in Technology

    The discipline of IT security is changing rapidly. With new threats such as Heartbleed and FREAK being uncovered every day and new attacks such as Anthem and Sony constantly in the headlines, enterprises are being forced from their old perimeter-oriented thinking and into a new world of incident response and risk-based decision making. To defend the organization’s data, security professionals must think differently.


    Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson on Wed., Apr. 15 for a live online discussion of this sea-changing shift in security strategy and the many ways it is affecting IT and business. Pironti and Wilson, who have spent the last few months talking with security thought leaders while building the Information Security and Risk track for the upcoming Interop Las Vegas conference Apr. 27-May 2, will outline some of the new thinking posed by some of the industry’s leading speakers and experts. Listeners will also get some advice on where they can go – and who to follow on social media – in order to learn more about the latest trends and shifts in risk and security.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:27
  • 00:07

    PODCAST: Cris Thomas, Strategist for Tenable Network Security

    in Technology

    Welcome to the TechSoure podcast series.  Today we are speaking Cris Thomas, Strategist for Tenable Network Security, who be discussing cybersecurity investments and CDM.

Join Host Live Chats

From the BTR Blog