• CLOUD Security

    in Technology

    "The LaPass RePort" Tech Tips Tuesdays on CLOUD Security.


    Visit us: www.LaPassProductions.com
    New Media Consulting since 2007

  • 00:32

    Is Your Cloud Infrastructure At Risk From Cyber Based Attacks? Find Out More!

    in Technology

    Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside.  But, there is also another critical asset which is just as much at risk.  This is your 'Cloud based Infrastructure'.  In today's business world, many entities now outsource their entire IT system to the Cloud.  The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.


    But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks.  In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 00:31

    Do Your Part to Ensure Security in the Cloud

    in Technology

    Doubts about security have shadowed the cloud since the cloud model's inception, as IT executives looked at the prospect of giving up some control over their computing and storage infrastructures. Whether those security concerns should be greater or less than those for on-premises IT and datacenters, IT's role in a cloud initiative certainly is different from that of traditional, internal IT. Yet, the key question remains constant: How can we best protect our company data and systems?


    IT security consultant and author Ira Winkler joins The Enterprise Cloud Site Radio Show on Thursday, June 26, at 2:00 p.m. EDT to discuss what IT executives can do to best protect a company's information resources during a move to a cloud-based infrastructure.


    Winkler is president of the Internet Security Advisors Group and is considered one of the world's most influential security professionals. He has been named a "Modern Day James Bond" by the media. He is the author of the books Spies Among Us and Zen and the Art of Information Security and has recently been elected Vice President of the Information Systems Security Association. Winkler began his career at the National Security Agency, and went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist, at HP Consulting, and Director of Technology of the National Computer Security Association.


    In this radio show, you will learn:



    How the security risks in the cloud may be different from those of internal IT
    Where the cloud may provide opportunities to improve IT security
    What are the key questions an enterprise IT executive should ask of potential cloud partners
    How to determine what security precautions a provider takes to protect its own systems
    What steps an enterprise should take in maintaining a working relationship with a cloud provider

  • 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:35

    Secure Your Big Data in the Cloud

    in Technology

    As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?


    Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.


    Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.


    Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.


    In this event you will learn:



    About the progress that the cloud sector and its customers have made in building a secure environment
    About some of the best practices for enterprises that the Cloud Security Alliance has already identified
    What types of big data applications are ready for everyday life in the cloud
    How security and privacy protections in the cloud environment may evolve in the year or so to come


    Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:27

Join Host Live Chats