Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:30

    Internet of Things (IoT) & the Security Challenges We Face

    in Technology

    The term Internet of Things (IoT) is relatively new and one we are going to be hearing a lot more about. Consider this; currently there are more wireless devices than there are people. The plus side is, of course, all of the great things we can do with this connectivity. The bad side is, at what risk? Recently 104,000 IRS records were breached. Are patient healthcare accounts secure?  These, and questions like them, will need answers as we continue the evolution to a 'connected society'.


    On June 1st, join host Melissa Birnie as she speaks with Dan Lohrmann, Chief Security Officer & Chief Strategist at Security Mentor, Inc., and most recently, Chief Security Officer for the State of Michigan, to learn more about IoT and the security challenges we will face as IoT becomes more prevalent.


    Our guest Dan Lohrmann holds a master’s degree in computer science from Johns Hopkins University in Baltimore and a bachelor’s degree in computer science from Valparaiso University in Indiana, and has more than 28 years of experience in the computer industry. He is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Under Lohrmann’s leadership, Michigan was recognized as a global leader in cyberdefense for government - winning numerous professional awards for outstanding accomplishments.

  • 00:16

    How Website Security Influences Your Website's Rankings and Performance

    in Marketing

    Can website security influence your website’s rankings? Website security is as essential as you locking the front door of your brick and mortar business. Just not as visible as this. Many think, because their website is not huge yet or they are not famous, that nobody would try to hack into their sites.


    Listen to this SEO podcast where One-Of-A-Kind SEO expert, SEO coach and Elite Business Strategist Dagmar Gatell speaks about devastating website security issues – from 22,200 faked pages on your website to becoming a sex site - and how to prevent them.


    P.S. Gain FREE access to our SEO premium content, including the 7 fatal SEO mistakes successful entrepreneurs make when building their autority online.

  • 00:38

    Cyber Security

    in Business

    On May 20, my guest will be Chris Moschovitis, the CEO of TMG-eMedia.  Chris studied Physics, Computer Science, and Mathematics, receiving his Bachelors of Science degree from The College at Brockport. His follow-up graduate studies at the University of Rochester, and New York University include advanced courses in technology, management, and education. In 1985 Chris was appointed Director of Academic Computing at Pratt Institute, and in 1987 he was recruited by the O’Connor Group for the position of Vice President of Information Technology. In heChris started his own company — the Technology Management Group. (“TMG” ) — focused on providing independent technology management expertise and outsourcing services. TMG further expanded its Internet offerings in 2004 by investing in emedia – a prominent, award winning, and internationally acclaimed interactive agency, forming TMG-eMedia, one of the premier independent consulting firms in the country. Over his career at TMG Chris has personally led a wide array of projects including: Due Diligence, Business Transformation, and Strategic Consulting assignments; Framework implementations (e.g. Balanced Scorecard, BCG, COBIT, ITIL, etc.); Content and Document Management (ECM/WCM) initiatives; ERP and CRM assessments, and rollouts ; Systems Architecture design and Cyber Security audits. Chris is co-author of the critically acclaimed “History of the Internet: 1843 to the Present” as well as a contributor to the “Encyclopedia of Computers and Computer History” and the “Encyclopedia of New Media.” In addition heis a member of several industry organizations (e.g. ISACA, IEEE, AMA) frequently writes articles, and is a sought after public speaker.

  • 02:01

    Food Security & Nation Building

    in Spirituality

    "There is no culture without Agriculture!" This week our guest speakers are community leaders who are currently providing solutions to meet the needs of our communities in the midst of a food desert. Having control and managing our food supply is very important. Food security is a vital aspect of our survival that we need to seriously address. Join us as we discuss tips and workable solutions to sustain and provide healthy food for our families and communities. WE ARE NATION BUILDING!!!  

  • 00:14

    On the Scene at the Border Security Conference

    in Technology

    Jim Smith of Polycom joins the program from the annual Border Security Expo to discuss the trends and technologies getting the most buzz at this year's conference.

  • 00:26

    The Promise of Water Security

    in Environment

    Recently, Terry Hazen was announced as the new head at the Institute for a Secure and Sustainable Environment at the University of Tennessee in Knoxville.


    Hazen brings an impressive set of environmentally related credentials with him to the new position. In addition to being the UT-Oak Ridge National Laboratory Governor’s Chair for Environmental Biotechnology, Hazen works with the Center for Environmental Biotechnology; directed investigation and recovery efforts surrounding the Deepwater Horizon oil spill; and was a senior scientist at Lawrence Berkeley National Laboratory in the Microbial Communities Division, the Center for Environmental Biotechnology, and the Ecology Department.


    Hazen also holds appointments in three UT departments—Civil and Environmental Engineering, Microbiology, and Earth and Planetary Sciences. He is a faculty fellow at ORNL and works with both the Bredesen Center for Interdisciplinary Research and Graduate Education and the UT-ORNL Graduate School of Genome Science and Technology.

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 00:47

    Cyber Security for Non-Profits - Scott Lawler

    in Finance

    Cyber Security for Non-Profits - Scott Lawler

  • 00:20

    Dj Nothin Nice Talks with LLFilms TNN Security Ceo Husky on Nothin Nice Radio

    in Radio

    Branding more and more Dj Nothin Nice sits down with L & L Films & Productions LLC & Team Nothin Nice security Husky @Huskysecurity_407 on Nothin Nice radio to talk about what it takes to make it in the Security business, current events and much more tune in online at http//www.blogtalkradio.com/nothinniceradio or listen on ya phones etc at 347 637 3398 

  • 00:28

    Data Security for Small Businesses and Franchises

    in Technology

    This week we'll discuss data security with John Martin and the team from First Watch Technologies!


    John will share best practices in keeping your brand and business safe from data breaches and other technology threats.  Join us Wednesday at 8pm ET! 


     


     

  • 00:35

    Information Security, Risk, and The Road Ahead

    in Technology

    The discipline of IT security is changing rapidly. With new threats such as Heartbleed and FREAK being uncovered every day and new attacks such as Anthem and Sony constantly in the headlines, enterprises are being forced from their old perimeter-oriented thinking and into a new world of incident response and risk-based decision making. To defend the organization’s data, security professionals must think differently.


    Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson on Wed., Apr. 15 for a live online discussion of this sea-changing shift in security strategy and the many ways it is affecting IT and business. Pironti and Wilson, who have spent the last few months talking with security thought leaders while building the Information Security and Risk track for the upcoming Interop Las Vegas conference Apr. 27-May 2, will outline some of the new thinking posed by some of the industry’s leading speakers and experts. Listeners will also get some advice on where they can go – and who to follow on social media – in order to learn more about the latest trends and shifts in risk and security.