SORT BY Relevancy
Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.
Liam Johnson returns to the show with a new science segment, and all our usual jazz..
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security.
Cyber Security is a growing issue around the world. On October 24, the International Cyber Threat Task Force (or ICTTF) will host the Cyber Threat Summit in a massive 24-hour webcast online. On this episode of Xerox Real Business Radio, we have two special guests. The first guest is Paul Dwyer, president of ICTTF and an internationally recognized information security expert with over 20 years of experience. We also have Chuck Brooks, vice president and client executive for the Department of Homeland Security at Xerox, with us. Both Paul and Chuck will discuss the upcoming Cyber Threat Summit, the evolving role of cyber security at the Department of Homeland Security and how public/private partnerships can support government security.
Hacking - It can happen to YOU, with catastrophic results.
Join us and special guest cyber security expert Kai Pfiester, principal of Black Cipher Security LLC, for an informative and in depth discussion about protecting your privacy and staying safe in today's Brave New World of online business and social media.
Call us at 347-850-8445
While the internet is a place where learning thrives and our students need to develop technology skills in order to be competitive in the workplace, it is not without its perils especially for our students. Cyber security is a skill that students should be aware of. What can parents, teachers, and school districts do to protect their students? Please join host Ray Pinney as he talks cyber security with representatives from the (ISC)2 Foundation. They will discuss the perils that our students face and a The Safe and Secure Online program that will help our kids be safe. If you want more information on cyber safety please email ISC2 firstname.lastname@example.org
With the recent cyber attack on Kickstarter, the public can see small businesses are not immune to being hacked. How can small to midsize businesses protect their data and personal interests? What are the steps to evaluating how secure your business' data is and what are some tech tools to help? Host, Cynthia Nevels, will chat wtih two cyber security industry leaders Kim Evans, Co-Chair of TechStreet Houston and Yo Delmar, Vice President of GRC Solutions, MetricStream on March 4, 2014 at 11:30 a.m. CST/12:30 p.m. EST on Disrupt Radio. #disuptiveview #disruptradio
As a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provide some insights into the implications of using VDI in your enterprise.
Daniel explains how while VDI solutions are certainly a beneficial tool to protect enterprises against device theft, they don’t provide protection against targeted threats such as mobile Remote Access Trojans (mRATs) and Man-in-the-Middle. In fact, as he shows in the research, threats against the underlying VDI platform are fairly easy to carry out by using widely-distributed free tools.
The podcast goes over the main topics that he’ll present at Blackhat, including the methods of research, potential threats and best practices that enterprises should follow.
Get the Report Here: http://bit.ly/xreport
Twice a year security professionals pause to read their own report on the trends and risks affecting IT Security. Produced by the IBM X-Force research team, this report investigates the state of cyber security, recent attacks along with improvements seen in vulnerability disclosures. If you are a CIO, CEO, CISO or a line of business executive this must read report outlines the new attack opportunities that social media presents for enterprises along with the impact all those new Apple iPhones and Android mobile devices can have on your business. This live interview will occur right after the report is released with Robert Freeman, X-Force research manager and Caleb Barlow. What will Robert reveal? Well - That despite several high-profile attacks conducted by suspected state-sponsored groups using advanced methods, X-Force believes off-the-shelf tools and techniques used against a broad target base were responsible for the bulk of 2012’s security incidents. They found that high profile attacks using zero-day exploits or designer malware code associated with Advanced Persistent Threats dominated the headlines, but more data was compromised using simple attacks launched against less prominent organizations.
The research from Robert's team also looked across industries. Are you in Healthcare? Energy and Utilities? Financial Services? Get educated on the treat to your business and some of the actions your team can take to address mobile security and even how to plan an emergency response in the event you are attacked.
Join us and we'll share with you what you need to know to stay ahead of the threat!
The Obama administration in response to Chinas cyber-attacks has issued and [another] executive order to improve critical infrastructure and expands the “voluntary” enhanced cybersecurty services program, enabling near real time sharing of cyber threat information to assist participating critical infrastructure companies in their cyber protection efforts.
[White house press release] The Executive Order directs the National Institute of Standards and Technology (NIST) to lead the development of a framework of cybersecurity practices to reduce cyber risks to critical infrastructure.
The Administration continues to believe that legislation is needed to fully address this threat. Existing laws do not permit the government to do all that is necessary to better protect our country. The Executive Order ensures that federal agencies and departments take steps to secure our critical infrastructure from cyber attack, as a down-payment on expected further legislative action.
What do you think?
Clif and Robin have an opinion on this and other items in the news, plus a “what the heck are they thinking” segment.
Hope that you will join us at 646-721-9887
In their latest book, Behold a Pale Farce, Violet Cheung and Bill Blunden engage in an honest discussion of society’s cyber insecurity problem by delving into the often unacknowledged technical, economic, and political root causes. As a result they’re able to prescribe solutions that don’t require users to sacrifice liberty or security. This is in stark contrast to flawed approaches, like the NSA’s dragnet surveillance, which are based on a mischaracterization of the problem. The rampant use of hyperbole and worst-case scenarios breeds the kind of mass anxiety which leads the public to blindly accept inappropriate solutions.
Bill is a computer security researcher whose current areas of inquiry touch on information security, anti-forensics, and institutional analysis. Though he’s probably best known for writing the industry’s most detailed manual for designing software back doors to date, the notorious Rootkit Arsenal, over the past two decades Bill has also performed R&D for an enterprise resource planning vendor, developed tools for network security appliances, and taken various detours through academia. He shares his findings at conferences like Black Hat, CEIC, SOURCE Boston, and UW-Madison’s LOCKDOWN.