Topic: Security

This page shows 21 to 30 of 67 total podcasts in this series.
<<Newer | 1- | 11- | 21- | 31- | 41- | 51- | 61- | Older>>

Jeff Jonas - Non-Obvious Relationship Awareness

Jeff Jonas of IBM explains enterprise intelligence by using his experience providing security in the gambling industry. When data is kept in separate silos, important connections can be overlooked. Jeff outlines the method he uses to manage connections in multiple large datasets.
      details...

Trust Online Conference - Branding and Building Trust

Can consumers and social networkers trust the security and privacy of information they share on line? How can companies manage their brands to earn customer confidence? Lise Buyer moderates this astute panel of experts from business, the law and academia as they look at what it means to be trustworthy in the digital age.
      details...

Trust Online Panel - Enforcing and Enabling Trust

While the Internet is quickly becoming an indispensable part of our lives and business, it still remains a challenging environment to achieve a secure and private experience. In this moderated panel from the Trust Online Conference, Lise Buyer leads an insightful discussion of trust with the help of an extremely qualified panel. Scott Charney, Mozelle Thompson, and Dr. James Ransome share their experience while addressing some of the fundamental challenges of managing risk on the Internet.
      details...

Thorsten Holz - Technometria: Virtual Honeypots

Honeypots have demonstrated immense value in Internet security. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain. Thorsten Holz, co-author of the book Virtual Honeypots: From Botnet Tracking to Intrusion Detection, joins Phil and Scott to discuss the book and how the concept can assist in thwarting Internet malware. He talks about how they can be used for both protection and analysis.
      details...

Andrew Jaquith, Daniel Geer - Technometria: Security Metrics

In The Book of Risk, Dan Borge writes that "the purpose of risk management is to change the future, not to explain the past." The subtitle of Andrew Jaquith's book is "Replacing Fear, Uncertainty, and Doubt" and that is a clear description of the purpose of security metrics. Phil and Scott are joined by Andrew, as well as Daniel Geer, Vice President and Chief Scientist of Verdasys. The group discuss the concepts and purpose of metrics in security management, as well as Jaquith's book.
      details...

Deb Radcliff - Feeding the Game

Virtual booty has become more important to some online game players than feeding their real bodies in the physical world. Deb Radcliff, veteran online security writer and Vice President of Publishing for The Security Consortium discusses what is happening now that criminals have started to take advantage. In addition to discussing how the ability to monetize booty began, she identifies who the criminals are and what methods they are using to accomplish their acts.
      details...

Bogus Electronics, Open Targets & Success through Failure

On this edition of IEEE Spectrum Radio, learn about the ten percent of goods which are being sold on today's market: counterfeit; how complex analytics software circumvents privacy laws using digital data shredders; why we only learn from failure; and how the lack of diagnostic testing of security protocols is leaving the U.S. a wide open target.
      details...

Mikko Hypponen - Technometria: The Virus Problem

F-Secure is one of the leading companies devoted to the study and prevention of computer viruses, spam, and other types of malware. Mikko Hypponen, the company's Director of Anti-Virus Research, joins Phil and Scott in a discussion of the current status of the virus problem. In addition to reviewing his background, Mikko talks about how new viruses are studied and offers suggestions on how to better protect average users, who are still affected, even with constant warnings.
      details...

Phil Libin and Jon Udell - Proposed REAL ID Guidelines

The United States REAL ID Act was signed into law in May 2005 - but won't go into effect until 2009. Jon Udell speaks with CoreStreet's President, Phil Libin, and asks him to comment on the Department of Homeland Security's recently published guidelines on how Americans will need to identify themselves in the future. Learn about the dangers, and benefits, of this initiative for more stringent control of credentials.
      details...

Social Data Face-Off - A Where2.0 Panel Discussion

Since late 2005 we have seen an explosion in pushpin applications - consumer-facing web sites that let users mark, describe, and share places on a map. We don't yet know whether this is a fad like Friendster or a category killer like Wikipedia. In this session, Where 2.0 conference co-chair Nat Torkington puts the tough questions to Di-Ann Eisnor of Platial, Ben Nolan of Zopto.com, and Josh Peterson of 43places.com on money, viability, privacy, and growth. You'll learn who's doing what, why, and who has the best chances of succeeding.
      details...
This page shows 21 to 30 of 67 total podcasts in this series.
<<Newer | 1- | 11- | 21- | 31- | 41- | 51- | 61- | Older>>