SORT BY Relevancy
In this edition of DEMA Live, President and CEO of Red Five Security, Kris Coleman, will join us for a discussion regarding cyber security. We live in a society that is more socially connected than ever via smart phones, tablets, and computers. How much risk are we putting the principals that we work for and ourselves at? Mr. Coleman will shed light onto some of the areas of concern that his company sees on a daily basis and he will explain how to limit your exposure against cyber attacks. Join us for this live radio show and have your cyber security questions ready for Red Five Security.
Find out HOW to Be Smart About How You Use Technology and Use Critical Thinking to Make Smart Decisions!
Risk-Based Security and Self-Protection with Gary Vause and Derrick Brown
All roads to the digital future lead through security. However, in a digital business world, security cannot be a roadblock that stops all progress. Organizations will increasingly recognize that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. On the technical side, recognition that perimeter defense is inadequate and applications need to take a more active role in security gives rise to a new multifaceted approach. Security-aware application design, dynamic and static application security testing, and runtime application self-protection combined with active context-aware and adaptive access controls are all needed in today's dangerous digital world. This will lead to new models of building security directly into applications. Perimeters and firewalls are no longer enough; every app needs to be self-aware and self-protecting.
February 25, 2015, 1pm CST
Call in with comments or questions at (646) 478-5814
In recent years, the demand for cyber security professionals has grown more than 3.5 times faster than the demand for other IT jobs during the past five years and more than 12 times faster than the demand for all other non-IT jobs.
Join us on CSUTalkRadio as we discuss the rise in cyber terrorism and the need for cyber security professionals in the workforce. We will also let you know more about one of CSU’s new degree program offerings, a bachelor’s in information systems security.
Authomate's CTO, Piyush Bhatnagar, and CEO, Jeff Schmidt, join the program to discuss the current cybersecurity landscape facing today's consumers and enterprises, and why U.S. citizens today need to take more personal responsibility for the security of their personal data.
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
The average small business may not think that the same exposures for hacking, like what happened to Home Depot or Target, apply to them, but the truth is that small and Main Street businesses are far more vulnerable and face a greater risk.
Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside. But, there is also another critical asset which is just as much at risk. This is your 'Cloud based Infrastructure'. In today's business world, many entities now outsource their entire IT system to the Cloud. The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.
But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks. In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.
Tensor networks, quantum information, emergent space-time, black hole firewalls, cyber security. J ennifer talks with Shaun Maguire, a mathematical physicist with expertise in control theory, statistics and quantum computing. PhD student working in quantum information at Caltech. Founding member of Escape Dynamics Follow @shaunmmaguire @jenlucpiquant
Join Host Live Chats
- CDH Radio hosted by CHERUBS (12 chatters)
- IWS Radio (10 chatters)
- MHHS Eyes Wide Open (9 chatters)
- Christian Defence League (8 chatters)
- The Cosmic Citizen (7 chatters)
- WGAG Radio (7 chatters)
- Worldwide WakeUP Call (4 chatters)
- TheLegacyOfANation (4 chatters)
- Ordinarywmn (2 chatters)
- Ray Bokor and Sarah May (2 chatters)
- ROADTOSTARDOM RADIO (1 chatters)
- RU Instant Reaction Review (1 chatters)
- SOTT Radio Network (1 chatters)
- nXphase Records (1 chatters)
- On Air with Wheelze (1 chatters)
- THSI (1 chatters)
- The Seika Network (1 chatters)
- Cinema Files Radio (1 chatters)