• 01:02

    John Patrick Quirk - RNN Exclusive - National Security and Intelligence Expert

    in Politics

    Join Bob Barnet and Dan Owens with Special Guest John Patrick Quirk, author of a number of books and articles on national security and intelligence, including the CIA Entrance Examination, The Intelligence Community and the FBI Entrance Examination. Hear about the Gulen movement , Obama's failures in security abroad and at home, Islam in America, and other security matters of our time!

  • 00:35

    Protecting Your Online Business from Bad Guys with Device-based Intelligence

    in Technology

    In today's radio show, we step out of the world of Biometrics and into the much broader spectrum of Internet Security.  There is no doubt that today, online threats, risks, and hacks are fast becoming the norm.  Very often, online businesses become targets of sophisticated fraud rings and may not even know that they have been hit, or  become the victim of a cyber related crime, until it is too late.  At this point, the damage is done, and the brand reputation that took so long to build up can disappear in a flash.  What is an online business to do?  Obviously, keeping up with the latest in cybercrime is a full time task and businesses need a layered approach, including one that looks at the actual device being used to connect to the business (such as a mobile phone, tablet or computer).


    But, thanks to a revolutionary service called "ReputationManager 360" from Portland-based iovation, online businesses can now stay ahead of the bad guys.  How is this done?  Well, with iovation’s device reputation service, you can now find out the source of the cyber threat, and what device or group of devices, is causing the threat.


    Listen in to this radio show to find how you can finally protect your business from the bad guys!!!

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:38

    Application + Threat + Security intelligence = Priceless

    in Technology

    Caleb talks with Larry Gerard about how Application Security, Threat Management and Security Intelligence solutions can work together to provide an enhanced level of  protection for your application project from development thru production.

  • 01:38

    Average Intelligence

    in Pop Culture

    We are the Average White Guys, Gary and Nate, the two bastard children of Pop Culture and Momma Media and we are ready to share our unique views of the world at large with you. From our Week in Haiku to our "witty" banter, we promise you'll be entertained (or at least intrigued).

  • 01:01

    Average Intelligence

    in Pop Culture

    We are the Average White Guys, Gary and Nate, the two bastard children of Pop Culture and Momma Media and we are ready to share our unique views of the world at large with you. From our Week in Haiku to our "witty" banter, we promise you'll be entertained (or at least intrigued).

  • 00:43

    Significance and Security

    in Self Help

    Everyone desire security and significance.  Regardless of professions, credentials, or possessions, the vast majority of us are swimming in a sea of insecurity and trying our best to hide it.  The messages all around us are that worldly things can fulfill us.  It’s on TV, in magazines, on the internet; everywhere we turn we’re being bombarded by empty promises for a more fulfilling life. . . a better husband, a better body, a better career, a more beautifully decorated house . . . to be liked, to be wanted, to feel we have something unique to offer.  They sneak into our thought process and make us think, if only I had . . . I’d be so secure and fulfilled.


    Until our hearts find complete security and significance in God’s unconditional love, we will never be satisfied.  As children of God we are designed to find our identity, our significance, and our confidence in Him.  The only way we’ll be able to do this is if we move beyond knowing about God to knowing and relying on Him.


    When Christ told His disciples, “You shall know the truth, and the truth shall make you free” (John 8:32), He was referring not only to an intellectual assent to the truth, but also to the application of truth in the most basic issues of life:  our goals, our motives, and our sense of self-worth.  Unfortunately, many give only lip service to the powerful truths of the Scriptures.  True freedom is when we learn to apply foundational truths that can motivate us to live for Christ instead of the approval of others.

  • 01:07

    Average Intelligence

    in Pop Culture

    We are the Average White Guys, Gary and Nate, the two bastard children of Pop Culture and Momma Media and we are ready to share our unique views of the world at large with you. From our Week in Haiku to our "witty" banter, we promise you'll be entertained (or at least intrigued).

  • 01:00

    Average Intelligence: The Last Splash?

    in Pop Culture

    We are the Average White Guys, Gary and Nate, the two bastard children of Pop Culture and Momma Media and we are ready to share our unique views of the world at large with you. From our Week in Haiku to our "witty" banter, we promise you'll be entertained (or at least intrigued).

  • 00:30

    Randy Roberts talks Data Security on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches. 


    Connect with Randy: www.linkedin.com/in/rsroberts

Results Per Page: 12 | 24 | 48
Loading...
Loading...