• 00:31

    No security in job security, Own your Own!

    in Women

     Are you sitting on the fence about starting your own business? Can't seem to take that first step! Tune in Thursday December 18th at 6:00pm (EST) and be inspired by Tiki Bennett; she says working a job is okay but it won’t take care of your family in the future.  Owning your own is the KEY to breaking the cycle of passing debt down to your family. Tiki will share tip on how to prioritize your time for success. After working in the IT field in Project Management for over 20 years, she was laid off in 2011 and was out of work for 18 months, that time out of work helped her realize that there is no security in job security. Today she is a full time employee, full time student, and working a business from home with one of the leading health and wellness companies in the world but her main goal and focus is walk away from her job 2015 after working her business for only 2 years. 

  • SEO & Security are finally getting along.

    in Internet

    Today Dave and Ryan are talking about the  new harmonious relationship between SEO and Security. Google announces HTTPS as a ranking signal and we talk about what it means for your ranking in 2015. 


    In short Google is saying you should have an SSL or secure socket layer on your site, and it will help give you an SEO boost, that is great because it gives you a security boost as well.


    Too many times Security (the proverbial "redheaded step child") gets ignored due to the inconvenience of it. Finally getting some love from Google, I feel Special! :)


    Need an SSL Cert, you can get one here.


    http://www.secureserver.net/ssl/ssl-certificate.aspx?ci=8347&prog_id=412779


    http://moz.com/blog/seo-tips-https-ssl


    Starting in 2015, users of Google’s Chrome browser who visit an HTTP site will receive an alert that the site may not be fully secure. Initial alerts will simply mark a non-HTTPS site as having ‘Dubious” security but at a future date, Chrome will start labeling such sites as ‘Non-secure." - See more at: http://www.eweek.com/cloud/google-chrome-browser-to-warn-users-of-sites-that-dont-use-https.html#sthash.avEEWpUE.dpuf

  • 01:59

    Community Preparedness & Security Operations

    in Politics

    Our next guest will be discussing a topic that I think we will all benefit from. Arthur Evangelista, affectionately known as Dr Art, holds a PhD, is a Vietnam-era veteran, and is a graduate of the U.S. Army Military Police Academy. Just a short intro to which I'll add that he is proficient in community preparedness and security operations.



    This episode, Dr Art will be hitting on these topics:

    1)  Why Prepare ?

    2)  Psychology of Preparedness and Security

    3)  Considerations for Preparedness Planning and Group Security

    4)  Community and Groups…everyone contributes

    5)  Skill sets required for:
        Medical, Security and possible Resistance, Intelligence/Communications     Information, Food, Water and Irrigation, Waste Disposal, Children and the Infirm, Housing/Shelters, Long Term needs (foods, planting/harvest), Education, Psychological, Logistical, Mobilization, and rebuilding after-the-fact. Socio-political issues.

    Check out Dr Art's Web Sites: www.communitypreparedness.yolasite.com  and   http://www.survivaldoc.com

    As always your questions and comments are encouraged and welcomed.

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 02:56

    ALI: NATION - THE FALL OF AMERICA - Police vs Private Security Pt. II

    in Business

    On this edition of ALI: NATION we will look at Police vs Private Security in our communities. We will review the response from Andrew Hawkins of the Cleveland Browns. We will analyse what makes the most sense for the interest and growth of our communities.


    Call in we want to hear from you!


    Tune in strong days @ 3 PM PST/6 PM 

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 02:04

    Can Communities Hire A Private Security Company in Place of City Police?

    in Women

    Many community activists are calling for some kind of boycott during the holiday season in order to protest racial injustice. Some point to the successful Montgomery Bus Boycott as an example of how withdrawal of financial support can force necessary social change. But others say that the wrong message was sent with the efforts to desegregate buses in Montgomery: What should have happened is that African Americans should have used the money they saved to buy their own bus company. With that thought in mind, what would happened if communities hired their own private security company? Would that eliminate conflicts with racially biased city police officials? How much money would participating citizens have to contribute? Are there any existing companies that people trust to police their communities instead of the city police? Are enough communities organized into or neighborhood associations that are able to legally hire a security company to patrol their streets? 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:43

    How To Make Your E-Mail Transparent & Vaporize From The Bad Guys

    in Technology

    This is our third podcast now focusing upon Internet Security.  With our last two pocasts, we foused mostly on end to end Network Security, but in this interview, we take a different angle.  For instance, E-Mail Communications is at the crux of any network infrastructure.  When you compose and send a particular E-Mail message, how do you know it is not being intercepted by a malicious, third party, or that your intended recipient has even received that message?  Or, how do you know if the content of your E-Mail Message has not been compromised in any way?


    In today's radio show, we interview Mr. Mike Koclanes, Director of Sales at Vaporstream.  Their technology is very unique in the sense that E-Mail messages vaporize after reading with no data or meta data left on devices or servers. Messages cannot be printed, shared, stored or intercepted.


    Tune into our radio show and learn how to protect your E-Mail!!!

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

Results Per Page: 12 | 24 | 48

Join Host Live Chats

Loading...
Loading...