BlogTalkRadio uses cookies. By using our services, you're agreeing to our Cookies Policy. Got it

Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Cyber Security News

Security News & Information

×  

Follow This Show

Stay in the know about new episodes and updates.
This show discusses the social implications of various security technologies.

Upcoming Broadcasts

About Digital Defense, Inc.: Based in San Antonio, Texas and serving clients across numerous industries, Digital Defense's innovative and leading-edge technology helps organizations safeguard sensitive data and ease the burdens associated with information security. Frontline.Cloud, the original Security SaaS platform, delivers unparalleled accuracy and efficiencies through multiple systems including Frontline Vulnerability Manager (Frontline VM™), Frontline Web Application Scanning (Frontline WAS™), Frontline Active Threat Sweep (Frontline ATS™) and Frontline Pen Test™, while SecurED®, the company's security awareness training, promotes employees' security-minded behavior. About Bob Layton: As chief revenue officer for Digital Defense, Bob is responsible for leading the company's marketing, sales and business development efforts to support the company's next phase of growth and its expanding go-to-market plans. Prior to Digital Defense, Layton was SVP with Centre Technologies, where he focused on delivering flexible hybrid cloud managed services and SaaS business transformation. Prior to that, he was at Alert Logic where his accomplishments included a global re-launch of the partner program resulting in year-over-year (YoY) bookings growth and platform consumption on AWS and Azure platforms by more than 2X.
  • by Cyber Security News
  • in Technology
  • 01:00

On-Demand Episodes

Today on the podcast we speak to Tianyi Lu, Chief Architect of VirtualArmour. VirtualArmour is a global cybersecurity and managed services provider that delivers customized solutions to help businesses build, monitor, maintain and... more

In the world of Cyber security, being proactive is a must. Having this mindset means that you are one step ahead of the proverbial cat and mouse game. But to achieve this, it takes a combination of the right kind of technology and people.... more

When a business or a corporation acquires security-based solutions, whether it is in terms of hardware or software, many of them come ?out of the box?. This means that the IT Security staff is tasked to configure it all from the ground up,... more

Let's face it, the IT Security staff of businesses and corporations are over taxed today. Not only do they have to combat the Cyber threats that occurring today, but they have to keep up with the constant scramble of patches, software updates,... more

In today's Cyber security world, the landscape is changing on a daily basis. It seems like that hardly you have addressed one issue, there are literally 10 more which come up right after that. How is your staff supposed to keep up with all of... more

In today's Cyber security world, there is a tendency for businesses and corporations to spend money on the latest security tools in order to beef the lines of defense that protect their network infrastructure. But, is this money... more

If you think about it, what is one of you most valued possessions? Your car? Your house? Your savings? You've probably answered yes to all three. But have you given thought about your wireless device, especially your Smartphone? This tool... more

In the Cyber threat landscape of today, there are literally tons of risks and threats out there. It is almost impossible to keep up with all of this. This world is like a cat and mouse game, where the Cyber attacker is the cat, and you are the mouse,... more

As we know, the Cyber threat landscape is an ever changing one. It is very dynamic, and it seems that there is a new threat coming out every day in the news. If it is not a new threat directly, then more than likely it is a variant of an... more

Today, there are many kinds of Cyber threats that are out there. Some of course are deadlier than others . . . this includes Phishing Scams, Identity Theft, Trojan Horses, Malware, Key Logger Attacks, Spyware, Ransomware, Business Email... more

Comments

 comments