SORT BY Relevancy
IBM recently launched a new Security division that integrates IBM’s Tivoli, Rational and Information Management security software, appliances, lab offerings and services along with multiple acquisitions including the purchase of Q1 Labs in Waltham, Massachusetts. In this podcast Caleb talks with Marc Van Zadelhoff, Vice President Product Management for IBM Security about the new division, its goals and why IBM is making this bold move. IBM already operates the world’s broadest security research and development organization, comprising nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security, with chapters in the United States, Europe and Asia Pacific. These teams monitor 13 billion security events per day in more than 130 countries.
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security.
What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications.
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and remediate everything, but if you aren't scanning the right assets you're putting your corporate assets at risk, so let's talk about a practical approach to managing application security.
Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.
Liam Johnson returns to the show with a new science segment, and all our usual jazz..
August 15, 2013 – Today IBM announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. Join Caleb Barlow, Marc Van Zadelhoff and Yishay Yovel moments after the announcement to discuss the Trusteer solution, the formation of a new IBM cybersecurity lab in Israel and the capabilities that Trusteer will brings to the table to combat fraud and malware thru “trusted transactions” for mobile and traditional endpoints.
Podcast topics include: Trusteer, malware, mobile security, financial fraud, cybersecurity, accertify 41 Parameter Silver Tail Systems, RSA, Guardian Analytics ThreatMetrix, Kount, Iovation, fraud intelligence, QRadar, i2, SPSS, InfoSphere, financial malware, advanced threat protection, financial crimes, advanced persistent threat, trusted transactions
Zahir Ladhani is Vice President Smarter Workforce, IBM. Specifically, he leads the IBM Science & Consulting Group within Smarter Workforce. The goal of the Science & Consulting group is to help client's take the guesswork out of hiring, engagement, retention—and anything else that affects their workforce.
He joined Kenexa in 2010 in business development and was made President in 2011. He led the acquisition of Salary.com for Kenexa. And, with the IBM acquisition of Kenexa, along with his other responsibilities, helped aid the integration.
He joined Kenexa, an IBM company, with accounting, marketing, sales and operations experience from AstraZeneca where he was greatly involved with many major pharmaceutical launches.
Additionally, he continues to be a guest lecturer for MIT Sloan, Goldey-Beacon College and a guest speaker for IBM and World at Work, among others.
Doubts about security have shadowed the cloud since the cloud model's inception, as IT executives looked at the prospect of giving up some control over their computing and storage infrastructures. Whether those security concerns should be greater or less than those for on-premises IT and datacenters, IT's role in a cloud initiative certainly is different from that of traditional, internal IT. Yet, the key question remains constant: How can we best protect our company data and systems?
IT security consultant and author Ira Winkler joins The Enterprise Cloud Site Radio Show on Thursday, June 26, at 2:00 p.m. EDT to discuss what IT executives can do to best protect a company's information resources during a move to a cloud-based infrastructure.
Winkler is president of the Internet Security Advisors Group and is considered one of the world's most influential security professionals. He has been named a "Modern Day James Bond" by the media. He is the author of the books Spies Among Us and Zen and the Art of Information Security and has recently been elected Vice President of the Information Systems Security Association. Winkler began his career at the National Security Agency, and went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist, at HP Consulting, and Director of Technology of the National Computer Security Association.
In this radio show, you will learn:
How the security risks in the cloud may be different from those of internal IT
Where the cloud may provide opportunities to improve IT security
What are the key questions an enterprise IT executive should ask of potential cloud partners
How to determine what security precautions a provider takes to protect its own systems
What steps an enterprise should take in maintaining a working relationship with a cloud provider
Social Security disability claims are not automatic and not everyone is entitled to them. Before a person can receive benefits, they must adhere to a complicated application process and possibly even a judicial review at a hearing. Join disability lawyer Scott Daniels, an associate with Markhoff & Mittman, as he breaks down how to navigate through the complex web that is the social security disability process.
IBM Raises its Internet Threat Level to AlertCon 2The IBM X-Force has been monitoring the situation with regards to Financial Institutions for a few weeks now. We are raising our AlertCon to 2 as the credibility of several threats has increased, and we want to highlight these threats to the Financial Industry. Our Assessment from Thursday, October 11th, details the current and past attacks as well as speculations to what the future may hold. At this time, DDoS attacks seem to be the primary att
Welsome to the first radio show of Apollo Biometrics, Inc. This is an interview with Mr. Mizan Rahman, the Founder, CTO, and CEO of M2SYS. In this radio show, we interview Mr. Rahman to see what inspired him to start his company, and his visions for the future. We will discover the strategies that they have used to become pioneers in the Biometrics Industry, and learn about some of their most successful implementations. Also, we will get a firsthand view from an industry expert as to what the future holds for Biometrics.
In this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device.
To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ .
Join Host Live Chats
- The Wacko Network (14 chatters)
- I Am Rebecca (13 chatters)
- EnlightenmentEvolution Network (7 chatters)
- District 86 Toastmasters Radio Show (6 chatters)
- House To Life (5 chatters)
- Kardec Radio (3 chatters)
- Ohio Exopolitics (3 chatters)
- spiritualactivists (3 chatters)
- The Couch Potato (3 chatters)
- UNSCRIPTED XBOX LIVE (3 chatters)
- TheLegacyOfANation (2 chatters)
- REVELATION aka (2 chatters)
- ExpandingU RADIO (2 chatters)
- Back To Us (2 chatters)
- CTKRMinistries (2 chatters)
- Dr Ed Moloney (1 chatters)
- Find Yourself (1 chatters)
- Apostle Lonnie Stocks (1 chatters)
- Perspectivepower (1 chatters)
- Joy Keys (1 chatters)
- WARriorsInGODsArmy (1 chatters)
- ministercythiamwilliams (0 chatters)