• 01:08

    Dealing with cyber-security

    in Atheism

    Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.

     Liam Johnson returns to the show with a new science segment, and all our usual jazz..

  • 01:08

    Dealing with cyber-security

    in Atheism

    Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.

     Liam Johnson returns to the show with a new science segment, and all our usual jazz..

  • 00:18

    Cyber Security: Protecting Your Law Firm

    in Legal


    FBI Director Robert Mueller has said it best, when it comes to cyber-attacks “There are only two types of companies in the US; those that have been hacked and those that will be hacked.”  The victims of cyber- crime come in all shapes and sizes, not just the big companies like Target. The US National Cyber Security Alliance found that 60% of small companies shut down within six months of a cyber-crime attack.  There are ways to limit the severity of cyber-attacks that partners, attorneys and employees of law firms must know.  Listen to this podcast and learn what you can do to protect your firm from cyber breaches.


    About Charles Bernier

    Charlie Bernier, Esquire, is principal professional liability consultant and in-house counsel at ECBM Insurance Brokers and Consultants. Bernier began his law career practicing insurance defense at one of the oldest law firms in the country. He then worked at one of the largest professional liability wholesalers in the country and in 2013 joined ECBM.

  • 00:24

    Bird's Eye View: What I've Learned Working In Cyber Security

    in Technology

    In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security. 

  • 00:33

    How To Protect Your Business From The Cyber Attacker With DeviceLock DLP Suite

    in Technology

    This is our second radio show in which we focus primarily upon Internet and Cyber Security.  A couple of weeks ago, we introduced you to another Cyber Security Vendor which can protect your business at the primary root of network connectivity.  But in today's radio show, we learn about yet another unique product called the 'DeviceLock DLP Suite'.  It is actually a suite of security applications which consist of:

    1) DeviceLock;

    2) NetworkLock;

    3) ContentLock;

    4) Discovery;

    5) Search Server.

    Learn more about about all of these security software applications, and learn how to use them to stay one step ahead of the Cyber Hacker!!!

  • 01:59

    In Short Order -- rebroadcast Judy Mikovits, PhD

    in Health

    This is a rebroadcast of an earlier show. Please note that In Short Order is in the process of being syndicated. Stay tuned for more information.

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 

    This company has come out with the "holistic" view to security for any sized business, which includes the following components:

    *Incident Reporting and Risk Management;

    *Visitor Management;

    *Identification Management;

    *Compliance and Reporting;

    *Responsible Gaming.

    Learn more about this and much more in this radio interview!

  • 00:59

    World War III is a Cyber War and it Has Begun

    in Politics Conservative

    Did North Korea attack Sony?  Did Islamic Iranian hackers target airlines?  Malware panic seizes America.  Is North Korea working with Iran?  The Axis of Evil is alive and well. 

    The Federal Bureau of Investigation has warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment.

    The new war will be fought by tech warriors like Eric Schiffer, cyber security expert and is Chairman and CEO of Patriarch Equity, and DigitalMarketing.com.  Eric is an advanced tech expert, all his companies are armed and equipped with large digital security divisions and revolutionary cutting edge technology.


    Tags:  cyber attack, Sony, North Korea, Iran, FBI, Obama, Eric Schiffer, cyber security, hackers, malware

  • No security in job security, Own your Own!

    in Women

     Are you sitting on the fence about starting your own business? Can't seem to take that first step! Tune in Thursday December 18th at 6:00pm (EST) and be inspired by Tiki Bennett; she says working a job is okay but it won’t take care of your family in the future.  Owning your own is the KEY to breaking the cycle of passing debt down to your family. Tiki will share tip on how to prioritize your time for success. After working in the IT field in Project Management for over 20 years, she was laid off in 2011 and was out of work for 18 months, that time out of work helped her realize that there is no security in job security. Today she is a full time employee, full time student, and working a business from home with one of the leading health and wellness companies in the world but her main goal and focus is walk away from her job 2015 after working her business for only 2 years. 

  • 01:23

    In Short Order -- Linda Elsegood, LDN Research Trust

    in Health

    The LDN Research Trust hosted a conference November 7-8, 2014 in Las Vegas. Attendees were able to attend in person or via Live Stream. We have invited Linda back to In Short Order to hear all about the conference, the expert speakers, the exhibitors, and comments from those that were fortunate to attend.

    Also, we will ask about how LDN works, what conditions it is used for, and will be taking questions via the In Short Order chat room or via telephone at 347-326-9715. If you prescribe LDN or a patient using LDN, we would like to hear from you!

  • 00:35

    Protecting Your Online Business from Bad Guys with Device-based Intelligence

    in Technology

    In today's radio show, we step out of the world of Biometrics and into the much broader spectrum of Internet Security.  There is no doubt that today, online threats, risks, and hacks are fast becoming the norm.  Very often, online businesses become targets of sophisticated fraud rings and may not even know that they have been hit, or  become the victim of a cyber related crime, until it is too late.  At this point, the damage is done, and the brand reputation that took so long to build up can disappear in a flash.  What is an online business to do?  Obviously, keeping up with the latest in cybercrime is a full time task and businesses need a layered approach, including one that looks at the actual device being used to connect to the business (such as a mobile phone, tablet or computer).

    But, thanks to a revolutionary service called "ReputationManager 360" from Portland-based iovation, online businesses can now stay ahead of the bad guys.  How is this done?  Well, with iovation’s device reputation service, you can now find out the source of the cyber threat, and what device or group of devices, is causing the threat.

    Listen in to this radio show to find how you can finally protect your business from the bad guys!!!

Results Per Page: 12 | 24 | 48