SORT BY Relevancy
IBM recently launched a new Security division that integrates IBM’s Tivoli, Rational and Information Management security software, appliances, lab offerings and services along with multiple acquisitions including the purchase of Q1 Labs in Waltham, Massachusetts. In this podcast Caleb talks with Marc Van Zadelhoff, Vice President Product Management for IBM Security about the new division, its goals and why IBM is making this bold move. IBM already operates the world’s broadest security research and development organization, comprising nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security, with chapters in the United States, Europe and Asia Pacific. These teams monitor 13 billion security events per day in more than 130 countries.
IBM has been the bellwether par excellence for the modern American corporation. Under the founding Watson dynasty, which ruled the roost between 1914 and 1971, it reached the pinnacle of industrial success and then blazed a path into the emerging computer industry. Along the way it pioneered concepts and principles that became symbols of enlightened corporate stewardship. More recently, confronting globalization and the increased pace of technological change, it has moved away from their vision.
This afternoon we will examine the IBM legacy with Peter E. Greulich, a veteran IBM executive, who is the author of A View From Beneath The Dancing Elephant. A profile of his book can be found at:
Mr. Greulich is president of MBI Concepts Corporation and a contributor to the financial website Seeking Alpha.
Join us for a lively discussion of the remarkable heritage of IBM and its prospects for the future!
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/datingapps/
IBM is a world-class technology company, and we'll be sitting down with some of their movers and shakers at IBM InterConnect to find out how new developments and ways of thinking will affect how we work in the future.
Join us as we talk with:
Saurabh Calla, IBM product developer, on how Verse will create a new way to work
Brian Fanzo and Bryan Kramer, digital strategists, on how different generations envision the future of work
Amber Armstrong, IBM Director of Social Business Market Evangelism, on what role social plays in business
Alisa Maclin, IBM VP of Marketing for IBM Mobile Enterpriseon how mobile will impact new ways of working
"There is no culture without Agriculture!" This week our guest speakers are community leaders who are currently providing solutions to meet the needs of our communities in the midst of a food desert. Having control and managing our food supply is very important. Food security is a vital aspect of our survival that we need to seriously address. Join us as we discuss tips and workable solutions to sustain and provide healthy food for our families and communities. WE ARE NATION BUILDING!!!
This week we'll discuss data security with John Martin and the team from First Watch Technologies!
John will share best practices in keeping your brand and business safe from data breaches and other technology threats. Join us Wednesday at 8pm ET!
The discipline of IT security is changing rapidly. With new threats such as Heartbleed and FREAK being uncovered every day and new attacks such as Anthem and Sony constantly in the headlines, enterprises are being forced from their old perimeter-oriented thinking and into a new world of incident response and risk-based decision making. To defend the organization’s data, security professionals must think differently.
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson on Wed., Apr. 15 for a live online discussion of this sea-changing shift in security strategy and the many ways it is affecting IT and business. Pironti and Wilson, who have spent the last few months talking with security thought leaders while building the Information Security and Risk track for the upcoming Interop Las Vegas conference Apr. 27-May 2, will outline some of the new thinking posed by some of the industry’s leading speakers and experts. Listeners will also get some advice on where they can go – and who to follow on social media – in order to learn more about the latest trends and shifts in risk and security.
In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside. In the past, business owners would be required to purchase and deploy security technologies in "piecmeal". Meaning, only type of security technology served only specific purpose in safeguarding the business. Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly. Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach. However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies. In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems.
This company has come out with the "holistic" view to security for any sized business, which includes the following components:
*Incident Reporting and Risk Management;
*Compliance and Reporting;
Learn more about this and much more in this radio interview!
Join Michael and Ben once again to bring you the latest in the fight against tyranny. Liberty or Security? Very interesting discussion, I hope you will join us. Right here on NWO TRUTH RADIO MASS MEDIA.
NWOTRMASSMEDIA is a proud partner of The Coalition
Welcome to the TechSoure podcast series. Today we are speaking Cris Thomas, Strategist for Tenable Network Security, who be discussing cybersecurity investments and CDM.
Join Host Live Chats
- SOTT Radio Network (48 chatters)
- RequestFreeProphecyXcom (14 chatters)
- Ray Bokor and Sarah May (9 chatters)
- The Spiritual Concepts Show (8 chatters)
- English Defence League Radio (7 chatters)
- Ciracle Radio (5 chatters)
- The Yehudah Project (4 chatters)
- nXphase Records (2 chatters)
- Luqman Nation (1 chatters)
- Baseball Essential (1 chatters)
- Caribbean Radio Show CRS Radio (1 chatters)
- Southeast Vince (1 chatters)
- Tapp into the Truth (1 chatters)