SORT BY Relevancy
The discipline of IT security is changing rapidly. With new threats such as Heartbleed and FREAK being uncovered every day and new attacks such as Anthem and Sony constantly in the headlines, enterprises are being forced from their old perimeter-oriented thinking and into a new world of incident response and risk-based decision making. To defend the organization’s data, security professionals must think differently.
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson on Wed., Apr. 15 for a live online discussion of this sea-changing shift in security strategy and the many ways it is affecting IT and business. Pironti and Wilson, who have spent the last few months talking with security thought leaders while building the Information Security and Risk track for the upcoming Interop Las Vegas conference Apr. 27-May 2, will outline some of the new thinking posed by some of the industry’s leading speakers and experts. Listeners will also get some advice on where they can go – and who to follow on social media – in order to learn more about the latest trends and shifts in risk and security.
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When will our robot vacuums rebel, controlled by Skynet?
Join Caleb Barlow and Chris Poulin, Research Strategist for IBM's X-Force Security Threat Intelligence Team and IoT and connected car security expert, to separate the real security threats from FUD.
On November 20 my guest will be Brian Rauer, Executive Director of the Mid-Hudson (NY) Better Business Bureau and General Counsel of the Better Business Bureau serving Metropolitan New York. Earlier experience includes the Manhattan based law firm of Plunkett & Jaffe, P.C. Mr. Rauer serves on the Westchester County Consumer Advisory Council and was formerly on the Administrative Law Judge/Hearing Officer roster for the Westchester County Human Rights Commission. He previously served on the Board of Directors of the NY County Lawyers’ Assn. (NYCLA) and on the House of Delegates of the NY State Bar Association. He is a past Chair of the NYCLA Cyberspace Law Committee. He previously served on the Board of Directors of the Association for Conflict Resolution-Greater NY Chapter and the Board of Directors of the NY State Dispute Resolution Assn. Mr. Rauer formerly hosted/presented a regular segment on a nationally syndicated radio show and has presented an extensive array of programs on hot topics of public interest, including privacy/security, ID theft prevention and ethical business practice. He is a Magna Cum Laude graduate of Tulane Law School, receiving the Tulane Law Dean's Medal and selection for the Order of the Coif. Mr. Rauer earned his B.S. degree, Summa Cum Laude, in Business Administration.
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
Bob Dix, the Vice President of Global Government Affairs & Public Policy with Juniper Networks, rejoins the program to give his reaction to President Obama's executive order for private and public companies to share cyber security and security breach information to better solidify the nation's security posture. He also discusses more effective ways he feels private enterprise and government can work together to make citizens safer online, and the role that education plays in improving cyber security.
In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside. In the past, business owners would be required to purchase and deploy security technologies in "piecmeal". Meaning, only type of security technology served only specific purpose in safeguarding the business. Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly. Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach. However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies. In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems.
This company has come out with the "holistic" view to security for any sized business, which includes the following components:
*Incident Reporting and Risk Management;
*Compliance and Reporting;
Learn more about this and much more in this radio interview!
Correct information is the oil that keeps gears smoothly in motion. It is the defining difference in the animal kingdom and life itself. What is the source of informaiton - biology, chemistry, philosophy, dogma, concept, sense input, lower spirit forces, religions, beliefs, observation, experience, imagination, dreamtime, astral influxes, poetic inspirations, platitudes, Higher SELF, etc.?
Nothing exists without information at its core defining how it functions and responds to life. Energy is information. In modern times we are quite sloppy and cavalier with information. In days of yore, we were quite ignorant of information except in a most mundane survival sense, or superstitious sense.
In present time, we suffer from too much information, insufficent TRUTH information, mixed messages in our information, internet hodgepodge of unreliable information, government-control-grid information, candy-coated political information, educationally corrupted and diluted information, historically-twisted information, and other anomolies of information too much to enumerate.
The point is that information is not as it seems to be. We need to get a serious eye upon the business of information or else we will be manipulated by information that we have not analyzed for its TRUTH. Do you want to be a victim of information bias or GIGO?
We need common sense and guidance regarding the very nature of information. We NEED discernment and inisghts about how to analyze and sort out the onslaught of information we have come to rely upon as new 'daily bread' of life.
If we don't get some serious attention and discernment going on here, we will slip and slide within the mud of consciousness. We are worthy of more than such an immersion in the idea chaos GENERATED by unexamined information, and that includes the nature of information itself, yes?
Sharon Quinn and Will Gable
Our Supply Chain Expert Rob O’Byrne talks to Scott Taylor of Exact Security about Supply Chain Security issues.
Check out our website at http://www.logisticsbureau.com/ to get some tips on how Logistics and Supply Chain Consulting Services help you improve your service and your profits!
Book Store: https://www.supplychainsecretsbooks.com/series/
Each year, AFCEA sponsors a Conference that brings together senior military decision makers with top industry leaders to discuss the technology challenges facing the United Stated Armed Forces and how they can work together to overcome them.
Chris Myers and Harry Cornwell of Juniper are two of the industry leaders on the show floor. Chris is a technical director at Juniper Networks, and Harry is a Senior Systems Engineer and Security Subject Matter Expert. They joined the Modern Network Radio to discuss the main topics of the show - which revolve around mission assurance and security - and the technologies the military should be looking at as they better prepare to fight future wars in cyber space.
Antivirus is officially dead as the main security defense for the endpoint: a wave of startups and veteran security firms are moving away from signature-based protection to more proactive and adaptive detection and mitigation that better match the rapidly evolving and AV-evading threats of today. With the endpoint as typically the weakest link that attackers target, modern endpoint security technology is all about focusing on the client as both patient 0 and as a treasure trove of attack forensics intelligence.
Join us for an in-depth discussion of why and how endpoint security is changing dramatically -- on the next episode of Dark Reading Radio, "Endpoint Security Transformed," Wednesday, October 21, 2015, 1:00 p.m. New York (10:00 a.m. San Francisco), hosted by Dark Reading Executive Editor Kelly Jackson Higgins. Our guests include Intel Security/McAfee’s Candace Worley, senior vice president and general manager of endpoint security. Register now and join us Wednesday, October 21, 2015, 1:00 p.m. ET.
Brought to you by The American Public Safety Training Institute (TAPSTI) www.tapsti.org, this 2-hour session will review the work of Mark Sauter and James Carafano and their excellent textbook entitled “Homeland Security” (2012, 2nd ed.). This seminar introduces the listener to Homeland Security intelligence processes, methods, structure, and resources. In this seminar we will discuss Intelligence Collection and what counterintelligence is and does. To truly appreciate the role intelligence management has in our society we discuss intelligence organizations, missions, activities, and how state and local law enforcement tie into this whole complicated array of intelligence gathering and management to keep us safe. The latter part of the discussion is based on the new Departmnet of the Army publication "Protection of Civilians ATP 3-07.6" (29 October 2015 Release) and a discussion of how this could be modified to apply, in large part, to professional policing operations here in the United States.
What is Cyber security, and why should we pay attention to it? Cyber security also known as information technology security, “focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.”
Would you like to learn how to improve your security posture and more quickly detect security threats before they occur? Join us for an hour of free information and tips on Cyber security from a Security expert Kai Pfiester. You’ll learn what hackers are after and determine if you or your business are a potential targets and how hackers attack you! Kai will also share some helpful tips on how to protect yourself and your business.
Your Life Now radio show proudly presents Kai Pfiester, a cyber-security expert, the president of Black Cipher Security, a cyber-security company. He specializes in helping small to medium-sized businesses protect themselves from hackers, malware, insider threats and physical theft.
Kai He holds numerous IT security certifications such as Certified Ethical Hacker, OSWP and Security+. He has written articles on cyber security for the NJ Law Journal, NJ Business magazine, Burlington Regional Chamber of Commerce and several online publications. As a speaker, he has done presentations for the Phi Alpha Delta Law Fraternity International, NJ Society of CPAs, and several local business organizations.
For more information, please feel free to contact us at: http://YourLifeNow.info
Or email us at: YourLifeNow.firstname.lastname@example.org