SORT BY Relevancy
IBM recently launched a new Security division that integrates IBM’s Tivoli, Rational and Information Management security software, appliances, lab offerings and services along with multiple acquisitions including the purchase of Q1 Labs in Waltham, Massachusetts. In this podcast Caleb talks with Marc Van Zadelhoff, Vice President Product Management for IBM Security about the new division, its goals and why IBM is making this bold move. IBM already operates the world&rsq
August 15, 2013 – Today IBM announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. Join Caleb Barlow, Marc Van Zadelhoff and Yishay Yovel moments after the announcement to discuss the Trusteer solution, the formation of a new IBM cybersecurity lab in Israel and the capabilities that Trusteer will brings to the table to combat fraud and malware thru “trusted transactions” for mobile and traditional endpoints.
Podcast topics include: Trusteer, malware, mobile security, financial fraud, cybersecurity, accertify 41 Parameter Silver Tail Systems, RSA, Guardian Analytics ThreatMetrix, Kount, Iovation, fraud intelligence, QRadar, i2, SPSS, InfoSphere, financial malware, advanced threat protection, financial crimes, advanced persistent threat, trusted transactions
IBM Raises its Internet Threat Level to AlertCon 2The IBM X-Force has been monitoring the situation with regards to Financial Institutions for a few weeks now. We are raising our AlertCon to 2 as the credibility of several threats has increased, and we want to highlight these threats to the Financial Industry. Our Assessment from Thursday, October 11th, details the current and past attacks as well as speculations to what the future may hold. At this time, DDoS attacks seem to be the primary att
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
João Pedro Perez joined IBM in 1987and had a variety of experiences in his career. He spent his early days as a systems engineer and field representative. He moved on to become operations manager, sales manager, channels manager and business development. During that time João Pedro Perezalso worked in the Latin America headquarters. Mr. Perez has led IBM Brazil's Software Business Unit, Americas zSeries Software and Americas Tivoli Sales. Additionally, he le
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
Jonathan Ferrar, VP IBM's Smarter Workforce, will discuss the new initiative which is all about empowering HR, empowering the workforce and empowering your business.
He'll discuss the benefits of the Smarter Workforce - gaining the insight and ability to hire the right talent, engage your people and collaborate together.
Are you going to the Black Hat Security Conference starting on July 27th in Vegas? Here's a preview of what our team will be doing and the sessions that can help you build your schedule. In this podcast Caleb gives each of the IBM speakers a chance to give a quick commercial of their session so listen to this in the car or on the airplane on the way to Black Hat and you can map out your week.
Also check out our new blog at http://securityintelligence.com/
2013 is well on its way to be another record year for cyber intrusions, keeping security as a topic in every corporation’s boardroom and in every government agency.
How many vulnerabilities did your security team find scanning today, last month, or this year? And how many were high risk? In the first six months of 2013, the IBM X-Force Research and Development team analyzed 4,100 new security vulnerabilities and 900 million new web pages and images.
The IBM X-Force team just released their Trend and Risk Report which summarizes their findings on emerging threats and the 2013 attack landscape. If you are a CIO, CEO, CISO or a line of business executive this must read report outlines the new attack opportunities in areas like:
• Social media: how social media is a valuable tool for business, but is also being used by attackers for reconnaissance and launching attacks
• Mobile device malware: how the explosive growth of Android devices is attracting malware authors
• Poisoning the watering hole: how attackers are compromising a central strategic target and launching zero day exploits
• Distraction and diversion: how attackers are amplifying Distributed-Denial-of-Service (DDoS) attacks as a distraction to allow them to breach other systems
• Old techniques, new success: how today’s security complexity can enable old gaps to be exploited
Designing Exceptional Digital Experiences with IBM Social Business, Base22, and City Forward. Hosted by Pam Moore, CEO & Founder, Marketing Nutz.
Did you know...
You have 5 seconds to engage your audience online? 1 in 10 people own 3+ mobile devices?
Larry Bowden, Vice President, IBM Digital Experience Software Ben Shoemate, Base22 Co-founder and User Experience Specialist City Forward Team - Gina Cardosi, Kent Van Horn, Jeff Berg, Dave Rook
City Forward: http://cityforward.org