SORT BY Relevancy
What is sacred information? Where does it come from? This podcast is a prequil of what is to come in the future of Sacred Information. Here is where we explain who we are and the journey we are about to embark on.
Welsome to the first radio show of Apollo Biometrics, Inc. This is an interview with Mr. Mizan Rahman, the Founder, CTO, and CEO of M2SYS. In this radio show, we interview Mr. Rahman to see what inspired him to start his company, and his visions for the future. We will discover the strategies that they have used to become pioneers in the Biometrics Industry, and learn about some of their most successful implementations. Also, we will get a firsthand view from an industry expert as to what the future holds for Biometrics.
WednesdayShowers and thunderstorms likely, mainly after 2pm. Patchy fog before 10am. Otherwise, partly sunny, with a high near 90. Light west wind becoming southwest 5 to 10 mph in the afternoon. Chance of precipitation is 60%. New rainfall amounts between a tenth and quarter of an inch, except higher amounts possible in thunderstorms.
Wednesday NightShowers and thunderstorms likely, mainly before 7pm. Mostly cloudy, with a low around 69. West wind around 5 mph becoming calm in the evening. Chance of precipitation is 60%. New rainfall amounts between a tenth and quarter of an inch, except higher amounts possible in thunderstorms.
ThursdayShowers and thunderstorms likely, mainly after 11am. Partly sunny, with a high near 86. West wind 3 to 5 mph. Chance of precipitation is 60%. New rainfall amounts between a tenth and quarter of an inch, except higher amounts possible in thunderstorms.
Thursday NightA chance of showers. Mostly cloudy, with a low around 64. Northwest wind around 6 mph. Chance of precipitation is 30%. New rainfall amounts of less than a tenth of an inch possible.
Independence DayA slight chance of showers. Partly sunny, with a high near 80. Chance of precipitation is 20%.
Friday NightMostly clear, with a low around 53.
and other reports
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security.
Listen To The Secure 20/20 Podcast, Hosted by Mike Fitzpatrick, Founder and CEO of NCX Group. Join him as he interviews thought leaders from the Information Risk Management field and discusses emerging trends, breaking news and impacts to business. In this Broadcast, NCX Group CEO and Host of Secure 20/20, Mike Fitzpatrick interviews Paul Ingevaldson, the former CIO of ACE Hardware and the author of 9 1/2 Secrets Of A Great IT Organization. During the interview we'll discus
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and remediate everything, but if you aren't scanning the right assets you're putting your corporate assets at risk, so let's talk about a practical approach to managing application security.
Andrew S. Baker CEO of BrainWave Consulting Company, LLC shares his expertise in an area every business owner needs to know about
Providing Virtual CIO Services to SMB organizations (Information Security, IT Operations, IT/Business Integration & Technology Strategy) to increase corporate agility, mitigate business risk, reduce operating costs, and facilitate business growth.
Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.
Liam Johnson returns to the show with a new science segment, and all our usual jazz..
What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications.
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s. He has worked in: · local government · banking · non-profit · &
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national s
Doubts about security have shadowed the cloud since the cloud model's inception, as IT executives looked at the prospect of giving up some control over their computing and storage infrastructures. Whether those security concerns should be greater or less than those for on-premises IT and datacenters, IT's role in a cloud initiative certainly is different from that of traditional, internal IT. Yet, the key question remains constant: How can we best protect our company data and systems?
IT security consultant and author Ira Winkler joins The Enterprise Cloud Site Radio Show on Thursday, June 26, at 2:00 p.m. EDT to discuss what IT executives can do to best protect a company's information resources during a move to a cloud-based infrastructure.
Winkler is president of the Internet Security Advisors Group and is considered one of the world's most influential security professionals. He has been named a "Modern Day James Bond" by the media. He is the author of the books Spies Among Us and Zen and the Art of Information Security and has recently been elected Vice President of the Information Systems Security Association. Winkler began his career at the National Security Agency, and went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist, at HP Consulting, and Director of Technology of the National Computer Security Association.
In this radio show, you will learn:
How the security risks in the cloud may be different from those of internal IT
Where the cloud may provide opportunities to improve IT security
What are the key questions an enterprise IT executive should ask of potential cloud partners
How to determine what security precautions a provider takes to protect its own systems
What steps an enterprise should take in maintaining a working relationship with a cloud provider
Join Host Live Chats
There are no live chats in progress