• 01:08

    Dealing with cyber-security

    in Atheism

    Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.


     Liam Johnson returns to the show with a new science segment, and all our usual jazz..

  • 00:11

    PODCAST: National Cyber Security Awareness Month

    in Technology

    Welcome to the TechSource podcast series.  Today we are speaking with Paul Asadoorian, Product Evangelist, with Tenable Network Security, about National Cyber Security Awareness Month, as well as the “Internet of Things” and security.

  • 00:24

    Bird's Eye View: What I've Learned Working In Cyber Security

    in Technology

    In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security. 

  • 00:18

    Cyber Security: Protecting Your Law Firm

    in Legal

    Description:


    FBI Director Robert Mueller has said it best, when it comes to cyber-attacks “There are only two types of companies in the US; those that have been hacked and those that will be hacked.”  The victims of cyber- crime come in all shapes and sizes, not just the big companies like Target. The US National Cyber Security Alliance found that 60% of small companies shut down within six months of a cyber-crime attack.  There are ways to limit the severity of cyber-attacks that partners, attorneys and employees of law firms must know.  Listen to this podcast and learn what you can do to protect your firm from cyber breaches.


     


    About Charles Bernier


    Charlie Bernier, Esquire, is principal professional liability consultant and in-house counsel at ECBM Insurance Brokers and Consultants. Bernier began his law career practicing insurance defense at one of the oldest law firms in the country. He then worked at one of the largest professional liability wholesalers in the country and in 2013 joined ECBM.

  • 00:06

    The Evolving Role of Cyber Security

    in Internet

    Cyber Security is a growing issue around the world. On October 24, the International Cyber Threat Task Force (or ICTTF) will host the Cyber Threat Summit in a massive 24-hour webcast online. On this episode of Xerox Real Business Radio, we have two special guests. The first guest is Paul Dwyer, president of ICTTF and an internationally recognized information security expert with over 20 years of experience. We also have Chuck Brooks, vice president and client executive for the Department of Homeland Security at Xerox, with us. Both Paul and Chuck will discuss the upcoming Cyber Threat Summit, the evolving role of cyber security at the Department of Homeland Security and how public/private partnerships can support government security.

  • 00:33

    How To Protect Your Business From The Cyber Attacker With DeviceLock DLP Suite

    in Technology

    This is our second radio show in which we focus primarily upon Internet and Cyber Security.  A couple of weeks ago, we introduced you to another Cyber Security Vendor which can protect your business at the primary root of network connectivity.  But in today's radio show, we learn about yet another unique product called the 'DeviceLock DLP Suite'.  It is actually a suite of security applications which consist of:


    1) DeviceLock;


    2) NetworkLock;


    3) ContentLock;


    4) Discovery;


    5) Search Server.


    Learn more about about all of these security software applications, and learn how to use them to stay one step ahead of the Cyber Hacker!!!
     

  • 00:21

    Cyber Security Awareness Month

    in Finance

    Today marks the start of Cyber Security Awareness Month. Join Sean Martin of CSI as he discusses denial-of-service attacks, mobile trends, employee-owned devices and the IT movement to the Cloud.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:31

    Cyber Security for Students and Schools

    in Education

    While the internet is a place where learning thrives and our students need to develop technology skills in order to be competitive in the workplace, it is not without its perils especially for our students.  Cyber security is a skill that students should be aware of.  What can parents, teachers, and school districts do to protect their students?  Please join host Ray Pinney as he talks cyber security with representatives from the (ISC)2 Foundation.  They will discuss the perils that our students face and a The Safe and Secure Online program that will help our kids be safe.  If you want more information on cyber safety please email ISC2 sso@isc2chapternj.org

  • 01:30

    Cyber Security and Safety in your Business and Personal Life

    in Technology

    Hacking - It can happen to YOU, with catastrophic results. 

    Join us and special guest cyber security expert Kai Pfiester, principal of Black Cipher Security LLC, for an informative and in depth discussion about protecting your privacy and staying safe in today's Brave New World of online business and social media.  
     


    Call us at 347-850-8445

  • 00:30

    Small Business and Cyber Security: Protecting What's Yours

    in Business

    With the recent cyber attack on Kickstarter, the public can see small businesses are not immune to being hacked. How can small to midsize businesses protect their data and personal interests? What are the steps to evaluating how secure your business' data is and what are some tech tools to help? Host, Cynthia Nevels, will chat wtih two cyber security industry leaders Kim Evans, Co-Chair of TechStreet Houston and Yo Delmar, Vice President of GRC Solutions, MetricStream on March 4, 2014 at 11:30 a.m. CST/12:30 p.m. EST on Disrupt Radio. #disuptiveview #disruptradio

Results Per Page: 12 | 24 | 48
Loading...
Loading...