• 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:35

    Secure Your Big Data in the Cloud

    in Technology

    As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?


    Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.


    Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.


    Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.


    In this event you will learn:



    About the progress that the cloud sector and its customers have made in building a secure environment
    About some of the best practices for enterprises that the Cloud Security Alliance has already identified
    What types of big data applications are ready for everyday life in the cloud
    How security and privacy protections in the cloud environment may evolve in the year or so to come


    Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.

  • 00:30

    Chris Havrilla talks Data Reality on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    My conversations are authentic and take twists and turns resulting in raw perspectives about Big Data. You will not get these from the playing it safe and not willing to speak candidly Data Executives.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Chris Havrilla, Senior Director, HR Technology & Analytics at ADP.  Chris has a unique combination of experience in the Recruiting, HR, Information Technology, and Professional Services fields that she leverages to do projects related to Talent Acquisition Strategy Development/Implementation; Full Life Cycle Recruiting; Sourcing; Technology, Tools, Systems; Social Recruiting / Social Media Strategy and Implementation; Candidate Assessments; Interviewing; Executive Search; Staffing Business Models, Processes; Training; Consulting; Human Capital; etc. As a Consultant, she have had clients ranging from SMB markets to the Fortune 100. 


    Connect with Chris:  
    Linkedin



    www.linkedin.com/in/chrishavrilla


    Twitter



    havrilla


     

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 00:31

    Jessica Miller-Merrell unwraps HR Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    My conversations are authentic and take twists and turns resulting in raw perspectives about Big Data. You will not get these from ladder climbing, playing it safe and not willing to speak candidly Data Executives.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.

    Joining us will be Jessica Miller-Merrell: Author, Workplace Anthropologist & Field Analyst.  She loves human resources, technology and recruiting. Jessica is self-acclaimed to be the most influential and visible professional in the industry, it's hard to argue this point. She worked in HR and recruiting in a corporate capacity most of her professional career until starting her consulting full time in 2009. In 2007, Jessica founded a popular HR blog called Blogging4Jobs. She writes, trains and speaks on all topics related to the human capital industry. 

    Connect with Jessica:  
    Linkedin

    https://www.linkedin.com/in/jmillermerrell

    Twitter

    https://twitter.com/blogging4jobs

  • 00:30

    Michael Harms talks Big Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Michael Harms, Executive Director of Operations at TDn2K. TDn2K is the parent company to People Report, Black Box Intelligence and White Box Social Intelligence.


    Connect with Michael:  www.linkedin.com/in/mgharm

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:31

    Matt Gough talks no BS-Predictive Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    My conversations are authentic and take twists and turns resulting in raw perspectives about Big Data. You will not get these conversations from ladder climbing-playing it safe-not willing to speak candidly Data Executives.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.

    Joining us will be Matt Gough, Chief Echovater at Echovate.  Gough is a serial entrepreneur, founder and Chief Echovater at Echovate; a predictive cloud based hiring platform built from the ground up for emerging growth companies. 


    Matt bootstrapped his first company, which sold in 2005. Took some time away from running startups and consulted with Fortune 500 companies on innovation and product-to-market alignment. He co-founded a ventured backed predictive reference automation software raising venture capital and acquired a company in 2009. 

    For the last 6 years he has also mentored start-ups in NYC and Boston through TechStars accelerator and has spoken/written about the life of a start-up.

    Connect with Matt:  
    Linkedin
    www.linkedin.com/in/matthewgough10


    Twitter
    https://twitter.com/echovate

  • 00:32

    William Tincup talks Big Data on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. 


    Joining us will be William Tincup, Principal Analyst at KeyInterval Research, Business advisor and Co-Host of DriveThruHR - HR's #1 Podcast.  Listen to the show every Tuesday, 9am/Central Time starting January 13, 2015.


    Linkedin for William:  www.linkedin.com/in/tincup


     

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

Results Per Page: 12 | 24 | 48

Join Host Live Chats

Loading...
Loading...