• 00:31

    No security in job security, Own your Own!

    in Women

     Are you sitting on the fence about starting your own business? Can't seem to take that first step! Tune in Thursday December 18th at 6:00pm (EST) and be inspired by Tiki Bennett; she says working a job is okay but it won’t take care of your family in the future.  Owning your own is the KEY to breaking the cycle of passing debt down to your family. Tiki will share tip on how to prioritize your time for success. After working in the IT field in Project Management for over 20 years, she was laid off in 2011 and was out of work for 18 months, that time out of work helped her realize that there is no security in job security. Today she is a full time employee, full time student, and working a business from home with one of the leading health and wellness companies in the world but her main goal and focus is walk away from her job 2015 after working her business for only 2 years. 

  • SEO & Security are finally getting along.

    in Internet

    Today Dave and Ryan are talking about the  new harmonious relationship between SEO and Security. Google announces HTTPS as a ranking signal and we talk about what it means for your ranking in 2015. 


    In short Google is saying you should have an SSL or secure socket layer on your site, and it will help give you an SEO boost, that is great because it gives you a security boost as well.


    Too many times Security (the proverbial "redheaded step child") gets ignored due to the inconvenience of it. Finally getting some love from Google, I feel Special! :)


    Need an SSL Cert, you can get one here.


    http://www.secureserver.net/ssl/ssl-certificate.aspx?ci=8347&prog_id=412779


    http://moz.com/blog/seo-tips-https-ssl


    Starting in 2015, users of Google’s Chrome browser who visit an HTTP site will receive an alert that the site may not be fully secure. Initial alerts will simply mark a non-HTTPS site as having ‘Dubious” security but at a future date, Chrome will start labeling such sites as ‘Non-secure." - See more at: http://www.eweek.com/cloud/google-chrome-browser-to-warn-users-of-sites-that-dont-use-https.html#sthash.avEEWpUE.dpuf

  • 01:59

    Community Preparedness & Security Operations

    in Politics

    Our next guest will be discussing a topic that I think we will all benefit from. Arthur Evangelista, affectionately known as Dr Art, holds a PhD, is a Vietnam-era veteran, and is a graduate of the U.S. Army Military Police Academy. Just a short intro to which I'll add that he is proficient in community preparedness and security operations.



    This episode, Dr Art will be hitting on these topics:

    1)  Why Prepare ?

    2)  Psychology of Preparedness and Security

    3)  Considerations for Preparedness Planning and Group Security

    4)  Community and Groups…everyone contributes

    5)  Skill sets required for:
        Medical, Security and possible Resistance, Intelligence/Communications     Information, Food, Water and Irrigation, Waste Disposal, Children and the Infirm, Housing/Shelters, Long Term needs (foods, planting/harvest), Education, Psychological, Logistical, Mobilization, and rebuilding after-the-fact. Socio-political issues.

    Check out Dr Art's Web Sites: www.communitypreparedness.yolasite.com  and   http://www.survivaldoc.com

    As always your questions and comments are encouraged and welcomed.

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:31

    Patrick Poole, national security and terrorism correspondent

    in Current Events

    Patick Poole is a national security and terrorism correspondent for pj media.


    http://pjmedia.com/

  • 00:39

    How To Draw The Last Line Of Defense In Your Network Perimeter

    in Technology

    More so than just absolute threats to workstations or servers, security threats and risks posed to a network can have even graver consequences.  For example, if your network perimeter goes unprotected, malformed data packets can enter in, which can lead to Distributed Denial of Service (DDoS) attacks.  Also, an exposed network can allow for all types and kinds of malware, spyware, and adware to enter in, bringing your network and everything on it, to a screeching halt.  


    What can you do to protect your network?  In today's podcast, we learn about a new solution called 'GlassWire'.  It is a network security tool, and consists of the following features:


    1) Visual Network Monitoring;


    2) A Network Time Machine;


    3) Alert Systems;


    4) Bandwidth Usage Monitoring;


    5) Remote Server Monitoring;


    6) Internet Privacy Protection.


    Tune in and learn how to protect your network!!!

  • 02:56

    ALI: NATION - THE FALL OF AMERICA - Police vs Private Security Pt. II

    in Business

    On this edition of ALI: NATION we will look at Police vs Private Security in our communities. We will review the response from Andrew Hawkins of the Cleveland Browns. We will analyse what makes the most sense for the interest and growth of our communities.


    Call in we want to hear from you!


    Tune in strong days @ 3 PM PST/6 PM 

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 02:04

    Can Communities Hire A Private Security Company in Place of City Police?

    in Women

    Many community activists are calling for some kind of boycott during the holiday season in order to protest racial injustice. Some point to the successful Montgomery Bus Boycott as an example of how withdrawal of financial support can force necessary social change. But others say that the wrong message was sent with the efforts to desegregate buses in Montgomery: What should have happened is that African Americans should have used the money they saved to buy their own bus company. With that thought in mind, what would happened if communities hired their own private security company? Would that eliminate conflicts with racially biased city police officials? How much money would participating citizens have to contribute? Are there any existing companies that people trust to police their communities instead of the city police? Are enough communities organized into or neighborhood associations that are able to legally hire a security company to patrol their streets? 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

Results Per Page: 12 | 24 | 48

Join Host Live Chats

Loading...
Loading...