• 00:31

    Do Your Part to Ensure Security in the Cloud

    in Technology

    Doubts about security have shadowed the cloud since the cloud model's inception, as IT executives looked at the prospect of giving up some control over their computing and storage infrastructures. Whether those security concerns should be greater or less than those for on-premises IT and datacenters, IT's role in a cloud initiative certainly is different from that of traditional, internal IT. Yet, the key question remains constant: How can we best protect our company data and systems?


    IT security consultant and author Ira Winkler joins The Enterprise Cloud Site Radio Show on Thursday, June 26, at 2:00 p.m. EDT to discuss what IT executives can do to best protect a company's information resources during a move to a cloud-based infrastructure.


    Winkler is president of the Internet Security Advisors Group and is considered one of the world's most influential security professionals. He has been named a "Modern Day James Bond" by the media. He is the author of the books Spies Among Us and Zen and the Art of Information Security and has recently been elected Vice President of the Information Systems Security Association. Winkler began his career at the National Security Agency, and went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist, at HP Consulting, and Director of Technology of the National Computer Security Association.


    In this radio show, you will learn:



    How the security risks in the cloud may be different from those of internal IT
    Where the cloud may provide opportunities to improve IT security
    What are the key questions an enterprise IT executive should ask of potential cloud partners
    How to determine what security precautions a provider takes to protect its own systems
    What steps an enterprise should take in maintaining a working relationship with a cloud provider

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:15

    Federal Tech Trends - Cloud Builders

    in Technology

    Juniper Networks' Brian Roach returns to the program for the next installment of Federal Tech Trends. In this episode, Brian and Ryan explore what's driving cloud initiatives in the federal government, best practices employed by cloud builders, the security implications of cloud migrations and the role of SDN.

  • 01:00

    Improving Cloud Security; Obtaining More Economical Legal Advice

    in Business

    Cindy Towers founded a company that allows purchasers of legal services to achieve significant value by utilizing lawyers in non- traditional ways.


    Adam Simpson, CEO of Easy Office Phone on five myths of cloud-based communications and security.


    Donwload, read the latest free issue of Small Business Digest magazibe.


    An insurance exchange offering the best possiible healthcare insurance options to individuals and small businesses is now available.

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 00:08

    PODCAST: Government Cloud Computing Trends, Chris Sibold

    in Technology

    Welcome to the TechSource podcast series.  Today, we are speaking with Chris Sibold, Director, Federal Cloud and Managed Services Sales, at Iron Bow, about key government cloud computing trends in 2014.

Results Per Page: 12 | 24 | 48
Loading...
Loading...