• 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:30

    Michael Harms talks Big Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Michael Harms, Executive Director of Operations at TDn2K. TDn2K is the parent company to People Report, Black Box Intelligence and White Box Social Intelligence.


    Connect with Michael:  www.linkedin.com/in/mgharm

  • 00:32

    William Tincup talks Big Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. 


    Joining us will be William Tincup, Principal Analyst at KeyInterval Research, Business advisor and Co-Host of DriveThruHR - HR's #1 Podcast.  Listen to the show every Tuesday, 9am/Central Time starting January 13, 2015.


    Linkedin for William:  www.linkedin.com/in/tincup


     

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • CLOUD Security

    in Technology

    "The LaPass RePort" Tech Tips Tuesdays on CLOUD Security.


    Visit us: www.LaPassProductions.com
    New Media Consulting since 2007

  • 00:37

    Presenting Your Data: Visualizing the Data

    in Technology

    Join us for Session 3 of the All Analytics A2 Academy, The Results Are In: Presenting Data to Decision Makers. As data continues to grow in size and scope, it is easy to get lost in it. The spreadsheet is no longer the best way to look at most data. As data changes, the way we work with data needs to change as well. Complex data means we need to rely more on computer assistance and on figuring out ways for humans to digest more complicated information. In this episode we will explore:



    New methods of displaying data
    The value of automating some complex decisions
    3D printing as used in data visualization
    When to use visualization
    How to tell a story with data

  • 00:43

    Significance and Security

    in Self Help

    Everyone desire security and significance.  Regardless of professions, credentials, or possessions, the vast majority of us are swimming in a sea of insecurity and trying our best to hide it.  The messages all around us are that worldly things can fulfill us.  It’s on TV, in magazines, on the internet; everywhere we turn we’re being bombarded by empty promises for a more fulfilling life. . . a better husband, a better body, a better career, a more beautifully decorated house . . . to be liked, to be wanted, to feel we have something unique to offer.  They sneak into our thought process and make us think, if only I had . . . I’d be so secure and fulfilled.


    Until our hearts find complete security and significance in God’s unconditional love, we will never be satisfied.  As children of God we are designed to find our identity, our significance, and our confidence in Him.  The only way we’ll be able to do this is if we move beyond knowing about God to knowing and relying on Him.


    When Christ told His disciples, “You shall know the truth, and the truth shall make you free” (John 8:32), He was referring not only to an intellectual assent to the truth, but also to the application of truth in the most basic issues of life:  our goals, our motives, and our sense of self-worth.  Unfortunately, many give only lip service to the powerful truths of the Scriptures.  True freedom is when we learn to apply foundational truths that can motivate us to live for Christ instead of the approval of others.

  • 00:25

    Database Security Best Practices for Databases and Big Data

    in Technology

    Caleb talks with Joe DiPietro about practical security controls for databases and big data environments.  The following aspects of security and compliance will be covered:

    - what to monitor
    - how to discover sensitive information
    - validating security controls & database policies
    - what role does the business owner play in the security framework
    - what to protect in a big data environment
    The Ready for IBM Security Intelligence Partner Program Webinar link reference in the show is as follows:   https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
     

     

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

Results Per Page: 12 | 24 | 48
Loading...
Loading...