SORT BY Relevancy
What happens on Main Street stays on Main Street... When hackers breach the security of corporations it makes headlines, yet there is rarely a mention when cybercrime hits small to medium sized businesses (SMBs). Very few people are even aware that today’s cybercriminals are targeting SMBs, not just super-sized global businesses"
According to Verizon’s 2013 Data Breach Investigations Report, 71% of the data breaches investigated by the company’s forensic analysis unit targeted small businesses with fewer than 100 employees. Of that group, businesses with less than 10 employees were the most frequently attacked.
Tune in to listen to hightly sought after speaker Manuel W. Lloyd discusses why cybercriminals are zeroing in on Small Businesss that thinkk they are too small to worry about. You'll be surprised at which SMBs are at greater risk even compared to larger companies like Sony, Home Depot, Target, and others.
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals. Their concern: the administration's legislative proposals to tighten the screws on black hats could backfire and instead criminalize the good guys fighting the good fight to identify cybercrime activity and root out security weaknesses before the bad guys do.
Jeremiah Grossman, founder and CTO of WhiteHat Security, and Harley Geiger, advocacy director and senior counsel at the Center for Democracy & Technology, will join Dark Reading Radio to explore whether the administration's legislative proposals can actually stop the bad guys and protect victim organizations as intended, and how they could inadvertently render penetration testing, vulnerability reporting, and other key security research activity illegal.
in Self Help
Join Liz Vagenas with guest Sam Curry, the Chief Strategy Officer and Chief Technologist at RSA, the Security Division of EMC, a leading provider of enterprise security solutions, on Monday, January 27, 2014 at 11:30 am..
Sam will discuss what's hot these days in information security, as security professionals work to assure privacy and fight cybercrime.
What industries have the greatest need for cyber security professionals? What skills are most in demand? Where and how can IT security professionals get the training?
Liz and Sam will talk about these issues and more in the broadcast.
The economy may still be down, but cybercrime is most certainly doing boom business if the latest FBI statistics are correct. Not only does the average web surfer have to worry about spam and phishing, but they have to keep a weather eye out for organized criminals online who buy and sell everything from bank accounts to credit card numbers and social security numbers. Recently the FBI helped bring down a gang in Estonia that literally hijacked more than a half million computers and racked up $14 million for the effort. So if you want to find out how to protect yourself online, tune in.
Today we are continuing our 7th Anniversary Celebration with new guests and one of our all-time favorite interviews!
Nearly 30 million Americans have diabetes, and about six million people use life-saving insulin to manage their diabetes. The disease is complex and often overwhelming, creating barriers that may prevent people with diabetes from enjoying the same opportunities as everyone else. Certified Diabetes Educator and Registered Dietician, Tami Ross joins us to talk about things people with diabetes can do to simplify their lives.
While being held hostage through your phone or computer by a cyber attacker sounds like the plot of a movie, the reality is it’s happening every day to unsuspecting victims. People are being locked out of their devices—losing access to family photos, financial information and other files—by cybercriminals who are threatening to delete their data forever unless they pay a ransom. Cybercriminals are preying on people with these attacks in the places most of us spend the majority of our time: online and on our smartphones. Joining us to share details of the newly released Internet Security Threat Report is Kevin Haley is director of Symantec Security Response.
In June 2013, actress Sarah Michelle Gellar (Buffy the Vampire Slayer) shared why it's important to her as a mom to protect kids against pertussis by asking family members & friends to be vaccinated. Her interview ranks as our most downloaded interview ever! Today we are replaying this interview as we continue to celebrate 7 years on BTR!
We'll also be announcing the winner of the Barbie Bubble-Tastic Mermaid Doll giveaway and a NEW GIVEAWAY!! Tune in!
All Calls Taken Tonight 646 716 7259 - How far can people take things ? How much slander, libel and outright physical threats can one take ? I ask you I will be talking about how the Anti Vaccine movement turns on its own . In addition the dangerous atomsphere Spreaker a platform that where for now I have a account allows. This is not a joke . Call in and tell your truth - and your experience with internet crime. Have you been a victim ? Has anyone victimized you on a internet radio platform. We will talk solutions to end the abuse. It must end or the venues taken down
1. In the News 2. Public-Private Partnerships and Cybersecurity: Academics and private sector officials talked about ways private companies respond to cyber threats. They focused on how they partner with law enforcement to protect their networks, and the role of private cybersecurity response firms. Note: “The Evolution of Public/Private Engagement” was a panel at the day-long symposium, “Cybercrime 2020: The Future of Online Crime and Investigations,” held by the Justice Department’s Criminal Division and the Georgetown Law Center at the Law Center’s Gewirz Student Center. 3. Book Talk 4. Listener Calls
The May 24, 2012, episode of American Heroes Radio features a conversation withArt Bowker the author of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century.
Art Bowker began his career in criminal justice as a probation officer for the Cuyahoga County Adult Probation Department. In 1989, he went to work as a law enforcement investigator for the US Department of Labor where he was responsible for financial investigations of labor organizations. Currently, he is a Special Offender Specialist focusing on cybercrime. An expert in cybercrime, he has been both the Secretary and President of the High Technology Crime Investigation Association. Art Bowker is the author of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century.
CAN INTERNET ACTIVISIM TURN INTO A REAL POLITICAL MOVEMENT?
WHEN dozens of countries refused to sign a new global treaty on internet governance in late 2012, a wide range of activists rejoiced. They saw the treaty, crafted under the auspices of the International Telecommunication Union (ITU), as giving governments pernicious powers to meddle with and censor the internet. For months groups with names like Access Now and Fight for the Future had campaigned against the treaty. Their lobbying was sometimes hyperbolic. But it was also part of the reason the treaty was rejected by many countries, including America, and thus in effect rendered void.
The success at the ITU conference in Dubai capped a big year for online activists. In January they helped defeat Hollywood-sponsored anti-piracy legislation, best known by the acronym SOPA, in America’s Congress. A month later, in Europe, they took on ACTA, an obscure international treaty which, in seeking to enforce intellectual-property rights, paid little heed to free speech and privacy. In Brazil they got closer than many would have believed possible to securing a ground-breaking internet bill of rights, the “Marco Civil da Internet”. In Pakistan they helped to delay, perhaps permanently, plans for a national firewall, and in the Philippines they campaigned against a cybercrime law the Supreme Court later put on hold.
THE NEW GREEN
Debate and dissent over the issues raised by the spread of information technology are not new. In the 1990s civil-liberties groups, including the pioneering Electronic Frontier Foundation (EFF), campaigned against the Communications Decency Act, part of which was eventually overturned by America’s Supreme Court.
TUNE IN FOR MORE ON THIS...
In today's radio show, we step out of the world of Biometrics and into the much broader spectrum of Internet Security. There is no doubt that today, online threats, risks, and hacks are fast becoming the norm. Very often, online businesses become targets of sophisticated fraud rings and may not even know that they have been hit, or become the victim of a cyber related crime, until it is too late. At this point, the damage is done, and the brand reputation that took so long to build up can disappear in a flash. What is an online business to do? Obviously, keeping up with the latest in cybercrime is a full time task and businesses need a layered approach, including one that looks at the actual device being used to connect to the business (such as a mobile phone, tablet or computer).
But, thanks to a revolutionary service called "ReputationManager 360" from Portland-based iovation, online businesses can now stay ahead of the bad guys. How is this done? Well, with iovation’s device reputation service, you can now find out the source of the cyber threat, and what device or group of devices, is causing the threat.
Listen in to this radio show to find how you can finally protect your business from the bad guys!!!
Join Host Live Chats
There are no live chats in progress