Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:32

    Security In the Cloud

    in Technology

    When we talk to people about Cloud Computing, we often hear three issues that are concerns:  security, performance and availability.  A lot of business leaders are concerned that the Cloud may increase the risk of their IT infrastructure and will not be accessible when their customers, employees and partners need it. Tune in to learn more on this topic and get your questions answered regarding security in the cloud..

  • CLOUD Security

    in Technology

    "The LaPass RePort" Tech Tips Tuesdays on CLOUD Security.

    Visit us: www.LaPassProductions.com
    New Media Consulting since 2007

  • 00:31

    IoT Security: Reality or Thriller Plot Threats?

    in Technology

    When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When will our robot vacuums rebel, controlled by Skynet?

    Join Caleb Barlow and Chris Poulin, Research Strategist for IBM's X-Force Security Threat Intelligence Team and IoT and connected car security expert, to separate the real security threats from FUD.

  • 00:50

    Storm Cloud Daily #1

    in Politics Progressive

    Topics today include:

    Jimmy Carter comments on Hilary

    Jared From Subway

    Donald Trump and more

  • 00:28

    So, What Exactly is the Cloud?

    in Technology

    I don't think I'm the last person on earth who does not understand what the cloud is, but if Iam, I'm going to learn today!  Join us for a talk about cloud computing with expert Henry Dunn of H. C. Dunn Technology.  He is going to answer my tough (ok...basic) questions about the cloud and what it does.  It's time the veil is lifted folks.  

  • 00:48

    Data Security

    in Business

    On November 20 my guest will be Brian Rauer, Executive Director of the Mid-Hudson (NY) Better Business Bureau and General Counsel of the Better Business Bureau serving Metropolitan New York.  Earlier experience includes the Manhattan based law firm of Plunkett & Jaffe, P.C.   Mr. Rauer serves on the Westchester County Consumer Advisory Council and was formerly on the Administrative Law Judge/Hearing Officer roster for the Westchester County Human Rights Commission.  He previously served on the Board of Directors of the NY County Lawyers’ Assn. (NYCLA) and on the House of Delegates of the NY State Bar Association. He is a past Chair of the NYCLA Cyberspace Law Committee. He previously served on the Board of Directors of the Association for Conflict Resolution-Greater NY Chapter and the Board of Directors of the NY State Dispute Resolution Assn.  Mr. Rauer formerly hosted/presented a regular segment on a nationally syndicated radio show and has presented an extensive array of programs on hot topics of public interest, including privacy/security, ID theft prevention and ethical business practice.  He is a Magna Cum Laude graduate of Tulane Law School, receiving the Tulane Law Dean's Medal and selection for the Order of the Coif.  Mr. Rauer earned his B.S. degree, Summa Cum Laude, in Business Administration. 

  • 00:32

    Is Your Cloud Infrastructure At Risk From Cyber Based Attacks? Find Out More!

    in Technology

    Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside.  But, there is also another critical asset which is just as much at risk.  This is your 'Cloud based Infrastructure'.  In today's business world, many entities now outsource their entire IT system to the Cloud.  The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.

    But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks.  In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.

  • 01:59

    Homeland Security - The History and the Birth of Contemporary Homeland Security

    in Training

    Brought to you by The American Public Safety Training Institute (TAPSTI) www.tapsti.org, this 2 hour session will review the work of Mark Sauter and James Carafano and their excellent textbook entitled “Homeland Security” (2012, 2nd ed.).  This seminar includes a historical review of the Department of Homeland Security (DHS) from its early colonial legacy, to the Cold War, and then into its transition into its current form as the result of 9/11. Contemporary homeland security includes a huge array of challenges as our society becomes more technologically oriented and, as a result, more susceptible to targeting. We are dependent on stability in a very unstable world and, for the first real time, a very small group of people can wreak tremendous havoc. This seminar focuses on the change from national security being one that assumed the "homeland" was safe from its own people and the dangers were from outside our own borders to the present day where there can be no assumptions made where the next attack will come from. 

  • 00:23

    Containerization in a DevOps World: Can AppSec Keep Pace?

    in Technology

    Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Linux or Windows) organizations get many of the benefits of a VM without the overhead of a hypervisor. So what's the downside? Most security tools weren't designed to "play well" with containers. And many security teams aren't aware of the emerging threat models associated with rapid application development and containerized deployment. In this podcast we'll take a quick high-level look at how containerization and DevOps are transforming the application life cycle, explain what it means to security, and provide recommendations on the three things security teams should be doing about it now.


  • 00:39

    Tackling the NFV Security Challenge

    in Books

    Tune in to The New IP's Radio Show for a discussion with Ray Watson, VP of technology, and Mike Stute, chief scientist, at Masergy, to get an inside look into how service providers and large enterprises can assure network security in a cloud-based NFV infrastructure. On the show, Watson and Stute will discuss how New IP software-based networks built on virtualized functions may introduce a host of potential new security vulnerabilities thanks to the separation of the software function from the physical hardware. They’ll also cover the importance of assembling and orchestrating all the right security components to provide VNFs and their underlying execution environments with the right level of security, and talk about how to ensure security is preserved in an NFV environment.  Finally, they will discuss why the “old ways” of perimeter-based security can be inadequate for today’s virtualized, programmable and mobile-enabled networks, and will also be available after the show to take your questions in a live, interactive chat.   

  • 00:04

    Supply Chain Security

    in Business

    Our Supply Chain Expert Rob O’Byrne talks to Scott Taylor of Exact Security about Supply Chain Security issues. 


    Check out our website at http://www.logisticsbureau.com/ to get some tips on how Logistics and Supply Chain Consulting Services help you improve your service and your profits!


    Transcript: http://www.logisticsbureau.com/supply-chain-security/

    Book Store: https://www.supplychainsecretsbooks.com/series/