SORT BY Relevancy
The term Internet of Things (IoT) is relatively new and one we are going to be hearing a lot more about. Consider this; currently there are more wireless devices than there are people. The plus side is, of course, all of the great things we can do with this connectivity. The bad side is, at what risk? Recently 104,000 IRS records were breached. Are patient healthcare accounts secure? These, and questions like them, will need answers as we continue the evolution to a 'connected society'.
On June 1st, join host Melissa Birnie as she speaks with Dan Lohrmann, Chief Security Officer & Chief Strategist at Security Mentor, Inc., and most recently, Chief Security Officer for the State of Michigan, to learn more about IoT and the security challenges we will face as IoT becomes more prevalent.
Our guest Dan Lohrmann holds a master’s degree in computer science from Johns Hopkins University in Baltimore and a bachelor’s degree in computer science from Valparaiso University in Indiana, and has more than 28 years of experience in the computer industry. He is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Under Lohrmann’s leadership, Michigan was recognized as a global leader in cyberdefense for government - winning numerous professional awards for outstanding accomplishments.
This show focuses on Internet Security Awareness Training. At DCS Netlink "Dynamic Cloud Solutions," we are dedicated to Internet Security. We will discuss why the Human Element is still the weakest link to Internet Security. In addition, we will be featuring special guest Stu Sjouwerman (CEO of KnowBe4). Stu and Dane will help you learn what internet users can do to educate themselves, their companies/organizations in being prepared to protect their users from Internet threats, risks, and liabilities. Remember, "Security is Everyone's Business!"
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside. In the past, business owners would be required to purchase and deploy security technologies in "piecmeal". Meaning, only type of security technology served only specific purpose in safeguarding the business. Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly. Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach. However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies. In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems.
This company has come out with the "holistic" view to security for any sized business, which includes the following components:
*Incident Reporting and Risk Management;
*Compliance and Reporting;
Learn more about this and much more in this radio interview!
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/datingapps/
On May 20, my guest will be Chris Moschovitis, the CEO of TMG-eMedia. Chris studied Physics, Computer Science, and Mathematics, receiving his Bachelors of Science degree from The College at Brockport. His follow-up graduate studies at the University of Rochester, and New York University include advanced courses in technology, management, and education. In 1985 Chris was appointed Director of Academic Computing at Pratt Institute, and in 1987 he was recruited by the O’Connor Group for the position of Vice President of Information Technology. In heChris started his own company — the Technology Management Group. (“TMG” ) — focused on providing independent technology management expertise and outsourcing services. TMG further expanded its Internet offerings in 2004 by investing in emedia – a prominent, award winning, and internationally acclaimed interactive agency, forming TMG-eMedia, one of the premier independent consulting firms in the country. Over his career at TMG Chris has personally led a wide array of projects including: Due Diligence, Business Transformation, and Strategic Consulting assignments; Framework implementations (e.g. Balanced Scorecard, BCG, COBIT, ITIL, etc.); Content and Document Management (ECM/WCM) initiatives; ERP and CRM assessments, and rollouts ; Systems Architecture design and Cyber Security audits. Chris is co-author of the critically acclaimed “History of the Internet: 1843 to the Present” as well as a contributor to the “Encyclopedia of Computers and Computer History” and the “Encyclopedia of New Media.” In addition heis a member of several industry organizations (e.g. ISACA, IEEE, AMA) frequently writes articles, and is a sought after public speaker.
"There is no culture without Agriculture!" This week our guest speakers are community leaders who are currently providing solutions to meet the needs of our communities in the midst of a food desert. Having control and managing our food supply is very important. Food security is a vital aspect of our survival that we need to seriously address. Join us as we discuss tips and workable solutions to sustain and provide healthy food for our families and communities. WE ARE NATION BUILDING!!!
Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.
Can website security influence your website’s rankings? Website security is as essential as you locking the front door of your brick and mortar business. Just not as visible as this. Many think, because their website is not huge yet or they are not famous, that nobody would try to hack into their sites.
Listen to this SEO podcast where One-Of-A-Kind SEO expert, SEO coach and Elite Business Strategist Dagmar Gatell speaks about devastating website security issues – from 22,200 faked pages on your website to becoming a sex site - and how to prevent them.
P.S. Gain FREE access to our SEO premium content, including the 7 fatal SEO mistakes successful entrepreneurs make when building their autority online.
SPONSORED BY UNITED STATES VETS, INC.--VETERANS HELPING VETERANS. FOR MORE INFORMATION LOG ONTO UNITEDSTATESVETS.ORG, THEIR FACEBOOK PAGE AT FACEBOOK.COM/UNITEDSTATESVETS, OR CALL 419-206-5979.A
It's been a little bit, but Ms. Computer Lady has a show just for the indie recording artists. A quick synopsis in regards to Internet radio/podcasting, the differences, the advantages and disadvantages, a little bit of its history, and how it differs from commercial radio. Indie recording artists will also the updates in regards to submitting music solely versus sponsorships of shows, and on from there.
This is one show you don't want to miss, so make sure to spread the word and tune in.
Join Host Live Chats
- Bellesprit (9 chatters)
- The Wacko Network (8 chatters)
- The Truth About Church (4 chatters)
- Radio Jihad Network (4 chatters)
- From The Helicarrier (2 chatters)
- TLO Ministry (2 chatters)
- JASmius (1 chatters)
- Broad Street Line (1 chatters)
- REALMOFTHESEER (1 chatters)
- Sharry Edwards (1 chatters)
- SPECULATION SPORTS (1 chatters)
- The Organic View (1 chatters)