• 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:35

    Information Security, Risk, and The Road Ahead

    in Technology

    The discipline of IT security is changing rapidly. With new threats such as Heartbleed and FREAK being uncovered every day and new attacks such as Anthem and Sony constantly in the headlines, enterprises are being forced from their old perimeter-oriented thinking and into a new world of incident response and risk-based decision making. To defend the organization’s data, security professionals must think differently.


    Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson on Wed., Apr. 15 for a live online discussion of this sea-changing shift in security strategy and the many ways it is affecting IT and business. Pironti and Wilson, who have spent the last few months talking with security thought leaders while building the Information Security and Risk track for the upcoming Interop Las Vegas conference Apr. 27-May 2, will outline some of the new thinking posed by some of the industry’s leading speakers and experts. Listeners will also get some advice on where they can go – and who to follow on social media – in order to learn more about the latest trends and shifts in risk and security.

  • 00:55

    Social Enterprise to Build a Strong Future - Jean Block

    in Entrepreneur

    Jean Block, President of Jean Block Consulting and Social Enterprise Ventures is THE expert on Social Enterprise. Author of “The Nonprofit Guide to Social Enterprise: Show Me the (Unrestricted) Money!”, we are so happy to welcome her on as a regular feature every quarter to discuss all aspects of social enterprise. 


    Social Enterprise for nonprofits is often misunderstood with many myths and misconceptions about their ability to generate funds through revenue streams. As external funds become scarcer it is now critical to look internally at your own assets and to build a sustainable and strong future. Learn some key tips from Jean Block - a leader in the field. 


    http://thephilantrepreneur.com


    http://philantrepreneurfoundation.org


    http://socialenterpriseventures.com 


     

  • 00:31

    The Last Element Street Enterprise

    in Entrepreneur

    Hiphoppa-nomics


    Hip Hop Economics Conference Call


    Sat. 3:30pm-4pm

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:28

    Data Security for Small Businesses and Franchises

    in Technology

    This week we'll discuss data security with John Martin and the team from First Watch Technologies!


    John will share best practices in keeping your brand and business safe from data breaches and other technology threats.  Join us Wednesday at 8pm ET! 


     


     

  • 00:30

    Young Adult Chat! Topics on Work/Life Balance & Setting Yourself up for a Career

    in Goals

    EnterpriseLifeRadio is having a YOUNG ADULT CHAT! So call in to join to ask your questions and get answers! We are discussing work/life balance, career choices, career planning, choosing your path, finding your passion and how to set yourself up for a great career expereince and journey!


    Call in: 646-668-2725!!!! Come join the Fun! You want to be listening and calling in to this show. EnterpriseLifeRadio where we bring you everyday people doing extraordinarily amazing things on topics covering Family, Fun and Funds, Entrepreneurship, Parenthood and Enterprise! We look forward to you joining in the discussion!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:27
  • 00:07

    PODCAST: Cris Thomas, Strategist for Tenable Network Security

    in Technology

    Welcome to the TechSoure podcast series.  Today we are speaking Cris Thomas, Strategist for Tenable Network Security, who be discussing cybersecurity investments and CDM.

Join Host Live Chats

There are no live chats in progress

From the BTR Blog