Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:20


    in Education

    Discussion on Privacy as it pertains to Social Media

  • 00:31

    IoT Security: Reality or Thriller Plot Threats?

    in Technology

    When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When will our robot vacuums rebel, controlled by Skynet?

    Join Caleb Barlow and Chris Poulin, Research Strategist for IBM's X-Force Security Threat Intelligence Team and IoT and connected car security expert, to separate the real security threats from FUD.

  • 00:48

    Data Security

    in Business

    On November 20 my guest will be Brian Rauer, Executive Director of the Mid-Hudson (NY) Better Business Bureau and General Counsel of the Better Business Bureau serving Metropolitan New York.  Earlier experience includes the Manhattan based law firm of Plunkett & Jaffe, P.C.   Mr. Rauer serves on the Westchester County Consumer Advisory Council and was formerly on the Administrative Law Judge/Hearing Officer roster for the Westchester County Human Rights Commission.  He previously served on the Board of Directors of the NY County Lawyers’ Assn. (NYCLA) and on the House of Delegates of the NY State Bar Association. He is a past Chair of the NYCLA Cyberspace Law Committee. He previously served on the Board of Directors of the Association for Conflict Resolution-Greater NY Chapter and the Board of Directors of the NY State Dispute Resolution Assn.  Mr. Rauer formerly hosted/presented a regular segment on a nationally syndicated radio show and has presented an extensive array of programs on hot topics of public interest, including privacy/security, ID theft prevention and ethical business practice.  He is a Magna Cum Laude graduate of Tulane Law School, receiving the Tulane Law Dean's Medal and selection for the Order of the Coif.  Mr. Rauer earned his B.S. degree, Summa Cum Laude, in Business Administration. 

  • 01:18

    Invading Your Partner's Privacy

    in Comedy

    Joe and Kate are joined by Jon Rudnitsky and Nathan Macintosh to discuss whether or not they've ever gone through their girlfriend's or boyfriend's email , phone, or FaceBook and whether it's forgivable. They also talk about how when you break up with someone you shouldn't ever check their FaceBook page, because it'll just end with you crying in the fetal position.

  • 01:59

    Homeland Security - The History and the Birth of Contemporary Homeland Security

    in Training

    Brought to you by The American Public Safety Training Institute (TAPSTI) www.tapsti.org, this 2 hour session will review the work of Mark Sauter and James Carafano and their excellent textbook entitled “Homeland Security” (2012, 2nd ed.).  This seminar includes a historical review of the Department of Homeland Security (DHS) from its early colonial legacy, to the Cold War, and then into its transition into its current form as the result of 9/11. Contemporary homeland security includes a huge array of challenges as our society becomes more technologically oriented and, as a result, more susceptible to targeting. We are dependent on stability in a very unstable world and, for the first real time, a very small group of people can wreak tremendous havoc. This seminar focuses on the change from national security being one that assumed the "homeland" was safe from its own people and the dangers were from outside our own borders to the present day where there can be no assumptions made where the next attack will come from. 

  • 00:34

    Endpoint Security Transformed

    in Technology

    Antivirus is officially dead as the main security defense for the endpoint:  a wave of startups and veteran security firms are moving away from signature-based protection to more proactive and adaptive detection and mitigation that better match the rapidly evolving and AV-evading threats of today. With the endpoint as typically the weakest link that attackers target, modern endpoint security technology is all about focusing on the client as both patient 0 and as a treasure trove of attack forensics intelligence.

    Join us for an in-depth discussion of why and how endpoint security is changing dramatically -- on the next episode of Dark Reading Radio, "Endpoint Security Transformed," Wednesday, October 21, 2015, 1:00 p.m. New York (10:00 a.m. San Francisco), hosted by Dark Reading Executive Editor Kelly Jackson Higgins. Our guests include Intel Security/McAfee’s Candace Worley, senior vice president and general manager of endpoint security. Register now and join us Wednesday, October 21, 2015, 1:00 p.m. ET.

  • 00:39

    Security and Privacy

    in Politics

    "We're talking about encryption. We're talking about dropping programs that are hostile to privacy. Get rid of Dropbox, Facebook and Google have improved their security, they remain “dangerous services” that people should avoidit doesn't support encryption, it doesn't protect your private files. And use competitors like SpiderOak, that do the same exact service but they protect the content of what you're sharing." Ed Snowden


  • 00:44

    Facebook Security and Privacy For Those Who Want to Be in the Know--That Means You

    in Spirituality

    Periodically, posts are shared virally about the privacy policy of Facebook or what people can and cannot see about your posts.  Often they are started by people or organization that want to cause fear so people leave Facebook and go to other social media or so the initial poster can increase their own views and gather personal information.  For the most part, you control what others see and don't see as well as what you see and don't see.  If you would like to have the most up-to-date information or have questions about what informaton is accurate and which is not, listen to Purpose Talk Radio on Monday, Jan. 12, noon PT/3 p.m. ET/8 p.m. UK. On the show, Facebook coach/consultant and PTR host Cindy Freeman will share the knowledge that she has gathered over the years on the social media platform.  These are things that, if you use them, you will not need to worry about your privacy or security.  You are welcome to join us on the air to share your experiences.

    For more of our guest's background, visit Purpose Talk Radio.

    Each Monday at 12 noon PST/3 pm EST/8 pm UK, our host, Cindy Freeman, and her guests bring insights and ideas to help you grow in your Soul path. Cindy's guests are from a variety of professionn, are experts on living their life with a purpose and are willing to share with listeners how they got there and how others might benefit from their experience. Join Cindy on Mondays live or archived to explore this area. Check out more information at Purpose Talk Radio and join the conversations on Facebook at Purpose Talk Radio Conversations.

  • 00:08

    Current Events - Privacy and Security

    in Lifestyle

    Current Events - Privacy and Security

  • 00:04

    Supply Chain Security

    in Business

    Our Supply Chain Expert Rob O’Byrne talks to Scott Taylor of Exact Security about Supply Chain Security issues. 


    Check out our website at http://www.logisticsbureau.com/ to get some tips on how Logistics and Supply Chain Consulting Services help you improve your service and your profits!


    Transcript: http://www.logisticsbureau.com/supply-chain-security/

    Book Store: https://www.supplychainsecretsbooks.com/series/


  • 00:30

    Exvadio - Privacy vs Security

    in Lifestyle

    Are we giving up too much privacy for the sake of security? How much privacy do we really have? Join host Eric Lopkin to find out what you can do the keep some of your privacy.