• 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • No security in job security, Own your Own!

    in Women

     Are you sitting on the fence about starting your own business? Can't seem to take that first step! Tune in Thursday December 18th at 6:00pm (EST) and be inspired by Tiki Bennett; she says working a job is okay but it won’t take care of your family in the future.  Owning your own is the KEY to breaking the cycle of passing debt down to your family. Tiki will share tip on how to prioritize your time for success. After working in the IT field in Project Management for over 20 years, she was laid off in 2011 and was out of work for 18 months, that time out of work helped her realize that there is no security in job security. Today she is a full time employee, full time student, and working a business from home with one of the leading health and wellness companies in the world but her main goal and focus is walk away from her job 2015 after working her business for only 2 years. 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 01:13

    SEO & Security are finally getting along.

    in Internet

    Today Dave and Ryan are talking about the  new harmonious relationship between SEO and Security. Google announces HTTPS as a ranking signal and we talk about what it means for your ranking in 2015. 


    In short Google is saying you should have an SSL or secure socket layer on your site, and it will help give you an SEO boost, that is great because it gives you a security boost as well.


    Too many times Security (the proverbial "redheaded step child") gets ignored due to the inconvenience of it. Finally getting some love from Google, I feel Special! :)


    Need an SSL Cert, you can get one here.


    http://www.secureserver.net/ssl/ssl-certificate.aspx?ci=8347&prog_id=412779


    http://moz.com/blog/seo-tips-https-ssl


    Starting in 2015, users of Google’s Chrome browser who visit an HTTP site will receive an alert that the site may not be fully secure. Initial alerts will simply mark a non-HTTPS site as having ‘Dubious” security but at a future date, Chrome will start labeling such sites as ‘Non-secure." - See more at: http://www.eweek.com/cloud/google-chrome-browser-to-warn-users-of-sites-that-dont-use-https.html#sthash.avEEWpUE.dpuf

  • 01:59

    Community Preparedness & Security Operations

    in Politics

    Our next guest will be discussing a topic that I think we will all benefit from. Arthur Evangelista, affectionately known as Dr Art, holds a PhD, is a Vietnam-era veteran, and is a graduate of the U.S. Army Military Police Academy. Just a short intro to which I'll add that he is proficient in community preparedness and security operations.



    This episode, Dr Art will be hitting on these topics:

    1)  Why Prepare ?

    2)  Psychology of Preparedness and Security

    3)  Considerations for Preparedness Planning and Group Security

    4)  Community and Groups…everyone contributes

    5)  Skill sets required for:
        Medical, Security and possible Resistance, Intelligence/Communications     Information, Food, Water and Irrigation, Waste Disposal, Children and the Infirm, Housing/Shelters, Long Term needs (foods, planting/harvest), Education, Psychological, Logistical, Mobilization, and rebuilding after-the-fact. Socio-political issues.

    Check out Dr Art's Web Sites: www.communitypreparedness.yolasite.com  and   http://www.survivaldoc.com

    As always your questions and comments are encouraged and welcomed.

  • 00:30

    The Security Juggernaut Of All - NEC Corporation of America

    in Technology

    In today's radio show, we have the privilige and honor to be interviewing one of the top executives of one of the largest IT and Security businesses in the world - Mr. Raffie Beroukhim, Vice President of the Biometrics division of NEC Corporation of America.  This garganutan business has collectively, more than 200 Biometric application deployments across 30 nations.  In this interview, we probe deeper into the Biometrics product line of NEC, which include the following:


    *Case Management;


    *Fingerprint Recognition;


    *Facial Recognition;


    *Mobile Solutions;


    *Large Scale Law Enforcement Applications.


    We will learn more from Mr. Beroukhim what makes NEC Corporation of America different from all of the other Biometric Vendors, and how they plan to keep up that strategic and competitive edge in the marketplace.

  • Patrick Poole, national security and terrorism correspondent

    in Current Events

    Patick Poole is a national security and terrorism correspondent for pj media.


    http://pjmedia.com/

  • 00:39

    How To Draw The Last Line Of Defense In Your Network Perimeter

    in Technology

    More so than just absolute threats to workstations or servers, security threats and risks posed to a network can have even graver consequences.  For example, if your network perimeter goes unprotected, malformed data packets can enter in, which can lead to Distributed Denial of Service (DDoS) attacks.  Also, an exposed network can allow for all types and kinds of malware, spyware, and adware to enter in, bringing your network and everything on it, to a screeching halt.  


    What can you do to protect your network?  In today's podcast, we learn about a new solution called 'GlassWire'.  It is a network security tool, and consists of the following features:


    1) Visual Network Monitoring;


    2) A Network Time Machine;


    3) Alert Systems;


    4) Bandwidth Usage Monitoring;


    5) Remote Server Monitoring;


    6) Internet Privacy Protection.


    Tune in and learn how to protect your network!!!

Results Per Page: 12 | 24 | 48
Loading...
Loading...