Cyber Risk Management tagged posts:

Security Response, July Blog

September 20th, 2006 |

A Symantec Security Response podcast focused on a roundup of the latest Symantec Security Response Weblogs for July 2006. The goal of this podcast is to help you better understand some of the threats and trends that Symantec’s Security Response [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,

Cyberterror and Cyberdefense: Where We Stand Five Years After 9/11

September 8th, 2006 |

BOSTON, September 8, 2006 (PodTech News) — After the 9/11 attacks, there was talk of a cyber Pearl Harbor, in which trained terrorist groups would use computers and the Internet to attack critical infrastructure in the United States. Five years [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Security, Technology Tags: , , , ,

IBM ShortCut #2: Is instant messaging confidential?

September 6th, 2006 |
IBM ShortCut #2: Is instant messaging confidential?

Who’s looking in when you send an instant message? ShortCuts web etiquette expert Penny Scharfman explains when, where and how IM can be seen and searched by others – and offers some tips on smart IM usage. This week’s links: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, IBM, Security, Technology Tags:

Hacks Attack!

September 1st, 2006 |
Hacks Attack!

LOS ANGELES, August 31, 2006 (PodTech News) — It seems a day doesn’t go by without another cyber attack from hackers, spammers, phishers or those seeking to steal your identity. But are we under attack more than ever before? PodTech’s [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Security, Technology Tags: , , , , ,

Phishing

A Symantec Security Response Podcast focusing on phishing and some of the new trends Symantec has identified in this all too popular online scam. This podcast also provides advice on how consumers can protect themselves and prevent from becoming a [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Symantec, Technology Tags: , , , ,

Symantec: New Computer

A Symantec Security Response Podcast focusing on the top security measures a consumer should take when setting up a new personal computer. Additionally, this podcast outlines the critical steps new personal computer owners need to take to protect their valuable [See the full post…]

See the full post  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags:

e-Crime and Network Security Threats

Juniper Networks correspondent Carol Wilson sits down with industry security experts and investigates how you and your enterprise can win the war against hackers, spammers and criminals. The podcast begins with David Flynn, vice president of products for Juniper Networks [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Juniper Networks J-News, Security, Technology Tags: , , , , ,

Symantec: New AV

A Symantec Security Response podcast focusing on how consumers can protect themselves from identity theft in a world of exploding antivirus options, by examining technologies, solutions and real world situations.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,

Juniper Networks Master of IT, Todd Plesko: triPRACTIX

Juniper Networks Master of IT, Todd Plesko: triPRACTIX

PodTech’s John Furrier had the chance to speak with Juniper’s Master of IT – Todd Plesko. In this podcast Todd talks about the challenges of network security for triPRACTIX.

This Juniper Networks podcast is part of the Juniper Networks Master [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Juniper Networks, Master of IT, Technology Tags: ,

Juniper Networks Master of IT, David O’Berry: South Carolina Department of Probation, Parole & Pardon Services

Juniper Networks Master of IT, David O’Berry: South Carolina Department of Probation, Parole & Pardon Services

Join John Furrier in his discussion of network security with David O’Berry from the South Carolina Department of Probation, Parole & Pardon Services. After serving their time in prison, many former convicts are under the jurisdiction of the state upon [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Juniper Networks, Master of IT, Technology Tags: , ,

Juniper Networks Master of IT, Burzin Engineer: Shopzilla

Juniper Networks Master of IT, Burzin Engineer: Shopzilla

Join John Furrier in his discussion of network security with Shopzilla’s Burzin Engineer.

This Juniper Networks podcast is part of the Juniper Networks Master of IT program. [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Juniper Networks, Master of IT, Technology Tags: , ,

Network and Application Visibility

blankPodTech’s John Furrier sits down with Juniper’s Sanjay Beri, Director of Product Management for the Security Products Group. For more information on Juniper Networks, please visit:

Juniper.net [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Juniper Networks J-News, Technology Tags:

Juniper Sound Off – Sanjay Beri, Director of Product Management in the Security Products Group

Jennifer Jones of PodTech speaks to Sanjay Beri, Director of Product Management in the Security Products Group of Juniper. This group within Juniper oversees the company’s leading security and attack prevention products. Sanjay and Jennifer discuss why content security is [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Technology Tags:

Security Analyst Series: Apple’s OS X operating system

A podcast from Symantec Security Response – Security Analyst Series – discussing Apple’s OS X operating system and potential security issues. The focus of this podcast is to help consumers better understand some of the potential security issues in Apple’s [See the full post…]

Download Audio FileListen/download audio  

Categories: Apple Voices, Connected Social Media, Corporate, Symantec, Technology Tags: ,

Symantec: Internet Security Threat Report, Vol. IX: are small and medium-sized businesses becoming larger targets?

This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at what types of threats are targeting small and medium-sized businesses.

Featuring Dean [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , ,

Symantec: Internet Security Threat Report, Vol. IX: Key Findings

This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It covers Internet attacks, vulnerabilities, malicious code, and future trends, and marks an increase in [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , , , ,

Symantec: Internet Security Threat Report, Vol. IX: how safe is Instant Messaging in the corporate environment?

This volume of the Symantec Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at the risks of Instant Messaging in corporate environments.

Featuring Dean Turner, Executive [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , , ,

Symantec Internet Security Threat Report, Vol. IX: the risks of Instant Messaging for consumers

This volume of the Internet Security Threat Report offers an overview of threat activity that took place between July 1 and December 31, 2005. It looks at the risks of Instant Messaging for the consumer.

Featuring Dean Turner, Executive Editor, [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , ,

Symantec Security Response: Wireless Security Trends

This podcast from Symantec Security Response focuses on wireless security trends uncovered in a global survey by the Economist Intelligence Unit and sponsored by Symantec. The goal of this podcast is to help enterprises and consumers better understand some of [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , ,

Intel vPro: Security and Manageability of Multiple Systems

John Furrier speaks with Tom Davis, CTO of LANDesk who discusses the future of IT Management based on virtualization. Davis envisions a day where multiple systems will be managed by a single virtual security appliance utilizing Intel’s vPro technology. The [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: , , , ,

Intel vPro: Mitigating Enterprise Risk

Ken Fitzpatrick, CMO of CheckPoint discusses their view of the enterprise and end to end security. Fitzpatrick explains to John Furrier how CheckPoint and Intel are able to mitigate enterprise risk together by leveraging the vPro technology.

Related Stories: IntelBusiness [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: , , , ,

Interop Keynote: Juniper’s Scott Kriens Says The Enterprise Operates a Global Campus

Interop Keynote: Juniper’s Scott Kriens Says The Enterprise Operates a Global Campus

LAS VEGAS, NV, May 2, 2006 (PodTech News) — Juniper CEO Scott Kriens took the keynote stage at the Interop conference in Las Vegas this morning and outlined several serious problems facing the developers of networking products, including security and [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Interop Conference, PodTech News, Tech Conferences and Events, Technology Tags: , , ,

Sounds of Interop 2006 Part I

Sounds of Interop 2006 Part I

Join PodTech’s Michael Johnson as he roams the floors and hallways of the Mandalay Bay Hotel Convention Center, talking with M-Systems, Crescendo Networks, and Viking Interworks about connectivity, security, and wireless data management.

More info at:

http://www.msystems.com

http://www.crescendonetworks.com

http://www.vikinginterworks.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Interop Conference, PodTech News, Tech Conferences and Events, Technology Tags: , , , , , ,

Intel Promises Security to Owners of PC Fleets on the vPro Platform – Part 3 of 4

SAN FRANCISCO, April 24, 2006 (PodTech News) Intel CEO Paul Otellini said that proactive security was one of the pillars of the company’s new business brand called vPro, which describes a range of products aimed at increasing productivity and decreasing [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: ,

Intel vPro: Security Is One of the Pillars of the New Brand from Intel

Symantec’s Enrique Salem says the security in Intel’s vPro brand represents a revolutionary approach to security with a system that can update itself while running the background of a company’s IT systems. John Furrier interviewed him for this podcast.

Related [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Intel, Intel vPro, IntelBusiness, Technology Tags: ,