|
A Symantec Security Response podcast focused on a roundup of the latest Symantec Security Response Weblogs for July 2006. The goal of this podcast is to help you better understand some of the threats and trends that Symantec’s Security Response [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: Cyber Risk Management, Security, Symantec, Weblogs
|
BOSTON, September 8, 2006 (PodTech News) — After the 9/11 attacks, there was talk of a cyber Pearl Harbor, in which trained terrorist groups would use computers and the Internet to attack critical infrastructure in the United States. Five years [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, PodTech News, Security, Technology Tags: Alan Paller, Cyber Risk Management, cybercrime, Noah Shacthman, SANS Institute
|
Who’s looking in when you send an instant message? ShortCuts web etiquette expert Penny Scharfman explains when, where and how IM can be seen and searched by others – and offers some tips on smart IM usage. This week’s links: [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, IBM, Security, Technology Tags: Cyber Risk Management
|
LOS ANGELES, August 31, 2006 (PodTech News) — It seems a day doesn’t go by without another cyber attack from hackers, spammers, phishers or those seeking to steal your identity. But are we under attack more than ever before? PodTech’s [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, PodTech News, Security, Technology Tags: Cyber Risk Management, hackers, Lauren Weinstein, People for Internet Responsibility, phishers, SMiShing
|
A Symantec Security Response Podcast focusing on phishing and some of the new trends Symantec has identified in this all too popular online scam. This podcast also provides advice on how consumers can protect themselves and prevent from becoming a [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Security, Symantec, Technology Tags: Cyber Risk Management, Phishing, podcast, Security, Symantec
|
A Symantec Security Response Podcast focusing on the top security measures a consumer should take when setting up a new personal computer. Additionally, this podcast outlines the critical steps new personal computer owners need to take to protect their valuable [See the full post…] |
See the full post
|
|
Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: Cyber Risk Management
|
Juniper Networks correspondent Carol Wilson sits down with industry security experts and investigates how you and your enterprise can win the war against hackers, spammers and criminals. The podcast begins with David Flynn, vice president of products for Juniper Networks [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Juniper Networks J-News, Security, Technology Tags: Carol Wilson, Cyber Risk Management, David Flynn, Doug Torre, hackers, Richard Clarke
|
A Symantec Security Response podcast focusing on how consumers can protect themselves from identity theft in a world of exploding antivirus options, by examining technologies, solutions and real world situations.
More information at:
Symantec.com [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: antivirus, Cyber Risk Management, Security, Symantec
|
Join John Furrier in his discussion of network security with David O’Berry from the South Carolina Department of Probation, Parole & Pardon Services. After serving their time in prison, many former convicts are under the jurisdiction of the state upon [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Juniper Networks, Master of IT, Technology Tags: Cyber Risk Management, David O'Berry, network security
|
Jennifer Jones of PodTech speaks to Sanjay Beri, Director of Product Management in the Security Products Group of Juniper. This group within Juniper oversees the company’s leading security and attack prevention products. Sanjay and Jennifer discuss why content security is [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Technology Tags: Cyber Risk Management
|
A podcast from Symantec Security Response – Security Analyst Series – discussing Apple’s OS X operating system and potential security issues. The focus of this podcast is to help consumers better understand some of the potential security issues in Apple’s [See the full post…] |
Listen/download audio
|
|
Categories: Apple Voices, Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, Dean Turner
|
This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at what types of threats are targeting small and medium-sized businesses.
Featuring Dean [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, Dean Turner, Symantec
|
This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It covers Internet attacks, vulnerabilities, malicious code, and future trends, and marks an increase in [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, cybercrime, Dean Turner, Security, Symantec
|
This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at the risks of Instant Messaging in corporate environments.
Featuring Dean Turner, Executive [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, Dean Turner, Instant Messaging, Symantec
|
This volume of the Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at the risks of Instant Messaging for the consumer.
Featuring Dean Turner, Executive Editor, [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, Dean Turner, Instant Messaging
|
This podcast from Symantec Security Response focuses on wireless security trends uncovered in a global survey by the Economist Intelligence Unit and sponsored by Symantec. The goal of this podcast is to help enterprises and consumers better understand some of [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Cyber Risk Management, Dean Turner, Symantec
|
John Furrier speaks with Tom Davis, CTO of LANDesk who discusses the future of IT Management based on virtualization. Davis envisions a day where multiple systems will be managed by a single virtual security appliance utilizing Intel’s vPro technology. The [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: Cyber Risk Management, IntelBusiness, LANDesk, Tom Davis, virtualization
|
Ken Fitzpatrick, CMO of CheckPoint discusses their view of the enterprise and end to end security. Fitzpatrick explains to John Furrier how CheckPoint and Intel are able to mitigate enterprise risk together by leveraging the vPro technology.
Related Stories: IntelBusiness [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: CheckPoint, Cyber Risk Management, IntelBusiness, Ken Fitzpatrick, vPro
|
LAS VEGAS, NV, May 2, 2006 (PodTech News) — Juniper CEO Scott Kriens took the keynote stage at the Interop conference in Las Vegas this morning and outlined several serious problems facing the developers of networking products, including security and [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Interop Conference, PodTech News, Tech Conferences and Events, Technology Tags: Cyber Risk Management, Interop, Juniper, Scott Kriens
Categories: Connected Social Media, Interop Conference, PodTech News, Tech Conferences and Events, Technology Tags: connectivity, Crescendo Networks, Cyber Risk Management, M-Systems, Security, Viking Interworks, wireless data management
|
SAN FRANCISCO, April 24, 2006 (PodTech News) Intel CEO Paul Otellini said that proactive security was one of the pillars of the company’s new business brand called vPro, which describes a range of products aimed at increasing productivity and decreasing [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: Cyber Risk Management, IntelBusiness
|
Symantec’s Enrique Salem says the security in Intel’s vPro brand represents a revolutionary approach to security with a system that can update itself while running the background of a company’s IT systems. John Furrier interviewed him for this podcast.
Related [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: Cyber Risk Management, IntelBusiness