Security channel:

October Blog Roundup

December 15th, 2006 |

A Symantec Security Response podcast featuring a roundup of the top weblog postings from Symantec Security Response engineers in October. This podcast features a summary of weblogs from Jonathan Omansky, Orla Cox, Candid Wueest and Josh Harriman.

More information at: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Symantec, Technology Tags: , , , , , ,

Security Response, September Blog

October 30th, 2006 |

A Symantec Security Response podcast focused on a roundup of the latest Symantec Security Response Weblogs for September 2006. The goal of this podcast is to help you better understand some of the threats and trends that Symantec’s Security Response [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IM Threats – Part II

October 17th, 2006 |

Learn about Instant Messaging (IM) threats and what you can do to protect your working environment.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IM Threats – Part I

October 11th, 2006 |

Learn about Instant Messaging (IM) threats and what you can do to protect your working environment.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Historical Evolution

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and the historical evolution of threats reported by Symantec over the past 4 years. The goal of this podcast is to provide the listener with an [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Future Watch

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and Symantec’s predictions on Future Threats. The goal of this podcast is to provide the listener with an overview of the some of the possible threats [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Key Findings

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and its key findings. The goal of this podcast is to provide the listener with an overview of the threats and trends covered in Symantec’s latest [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IBM ShortCut #6: How to catch phish

September 27th, 2006 |
IBM ShortCut #6: How to catch phish

How do you figure out if legitimate-looking email is attempting to steal your personal information? ShortCuts security expert Rocky Oliver explains how to intercept a phishing attack. This week’s links: Snopes.com, a site for researching and reporting internet hoaxes, [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, IBM, Security, Symantec, Technology Tags: , , ,

Symantec Home and Home Office Security Report for July 2006

September 24th, 2006 |

A Symantec Security Response podcast focused on the Symantec Home and Home Office Security Report for July 2006. The goal of this podcast is to help you better understand some of the threats and trends identified in the report and [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,

Security Response, July Blog

September 20th, 2006 |

A Symantec Security Response podcast focused on a roundup of the latest Symantec Security Response Weblogs for July 2006. The goal of this podcast is to help you better understand some of the threats and trends that Symantec’s Security Response [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,

Cyberterror and Cyberdefense: Where We Stand Five Years After 9/11

September 8th, 2006 |

BOSTON, September 8, 2006 (PodTech News) — After the 9/11 attacks, there was talk of a cyber Pearl Harbor, in which trained terrorist groups would use computers and the Internet to attack critical infrastructure in the United States. Five years [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Security, Technology Tags: , , , ,

IBM ShortCut #2: Is instant messaging confidential?

September 6th, 2006 |
IBM ShortCut #2: Is instant messaging confidential?

Who’s looking in when you send an instant message? ShortCuts web etiquette expert Penny Scharfman explains when, where and how IM can be seen and searched by others – and offers some tips on smart IM usage. This week’s links: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, IBM, Security, Technology Tags:

Hacks Attack!

September 1st, 2006 |
Hacks Attack!

LOS ANGELES, August 31, 2006 (PodTech News) — It seems a day doesn’t go by without another cyber attack from hackers, spammers, phishers or those seeking to steal your identity. But are we under attack more than ever before? PodTech’s [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Security, Technology Tags: , , , , ,

Phishing

A Symantec Security Response Podcast focusing on phishing and some of the new trends Symantec has identified in this all too popular online scam. This podcast also provides advice on how consumers can protect themselves and prevent from becoming a [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Symantec, Technology Tags: , , , ,

Symantec: New Computer

A Symantec Security Response Podcast focusing on the top security measures a consumer should take when setting up a new personal computer. Additionally, this podcast outlines the critical steps new personal computer owners need to take to protect their valuable [See the full post…]

See the full post  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags:

e-Crime and Network Security Threats

Juniper Networks correspondent Carol Wilson sits down with industry security experts and investigates how you and your enterprise can win the war against hackers, spammers and criminals. The podcast begins with David Flynn, vice president of products for Juniper Networks [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Juniper Networks J-News, Security, Technology Tags: , , , , ,

Symantec: New AV

A Symantec Security Response podcast focusing on how consumers can protect themselves from identity theft in a world of exploding antivirus options, by examining technologies, solutions and real world situations.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,

Blue Lane – Allwyn Sequeira, VP Engineering – Part 2 of 3

Enterprise Software Security Patch Management: A Perfect Storm? An interview with Blue Lane VP Engineering Allwyn Sequeira (http://www.bluelane.com/company/mgmt.php#sequeira ) Part 2 of a 3 part podcast interview.

The Blue Lane PatchPoint System is the only inline patch proxy for [See the full post…]

Download Audio FileListen/download audio  

Categories: Blue Lane, Connected Social Media, Security, Technology Tags:

Blue Lane – Allwyn Sequeira, VP Engineering – Part 3 of 3

Enterprise Software Security Patch Management: A Perfect Storm? An interview with Blue Lane VP Engineering Allwyn Sequeira (http://www.bluelane.com/company/mgmt.php#sequeira ) Part 3 of a 3 part podcast interview.

You can find out more about the Blue Lane and a completely [See the full post…]

Download Audio FileListen/download audio  

Categories: Blue Lane, Connected Social Media, Security, Technology Tags:

Barracuda Networks CEO Dean Drako – a continued conversation 3 of 3

March 29th, 2006 |
Barracuda Networks CEO Dean Drako – a continued conversation 3 of 3

John Furrier had a chance to sit down with Dean Drako, CEO of Barracuda Networks, to talk about the recent success of his company. Last month Barracuda Networks landed a $40 million dollar investment from some of the biggest [See the full post…]

Download Audio FileListen/download audio  

Categories: Barracuda Networks, Connected Social Media, Security, Technology Tags: , , , , , , , , , , , , , , ,

Juniper Networks Master of IT, Gene Fredriksen: Raymond James & Associates

Juniper’s Master of IT program has designated Gene Fredriksen of Raymond James & Associates. This is a great podcast since it details many of Gene’s best common practices for keeping one of the USA’s largest financial service firms safe, secure [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Juniper Networks, Master of IT, Security, Technology Tags:

Matthias D’Autremont, Network General’s Regional Lead Systems Engineer

March 1st, 2006 |

Listen to Matthias D’Autremont, Regional Lead Systems Engineer for Network General as he speaks about Net Gen’s Visualizer and Infinistream’s ability to “go back in time” for problem solving for high-speed Gigabit and Fast Ethernet networks.

For more information about [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Network General Sniffer Cast, Security, Technology Tags:

James Messer, Network General’s Lead Systems Engineer

March 1st, 2006 |

Listen to James Messer, Lead Systems Engineer for Network General speak about Net Gen’s vision for the future of the company.

For more information about Network General please go to:

www.networkgeneral.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Network General Sniffer Cast, Security, Technology Tags:

Vikas Aggarwal – Network General’s VP of Product Management

March 1st, 2006 |

Listen to Vikas Aggarwal, VP of Product Management for Network General talk about Net Vigil, which gives Network General even greater ability to drill down into networks for problem analysis.

For more information about Network General please go to:

www.networkgeneral.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Network General Sniffer Cast, Security, Technology Tags:

RSA – Dr Bill Hancock, Executive Vice President Commercial Business Division for SecureInfo

March 1st, 2006 |

“… What it really gets down to at a corporate level is assets, brand, and compliance…”

What are some key elements when it comes to Network Security? Compliance, and a good defense, among others according to Dr Bill Hancock, Executive [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Technology Tags: