Topic: Security

This page shows 31 to 40 of 67 total podcasts in this series.
<<Newer | 1- | 11- | 21- | 31- | 41- | 51- | 61- | Older>>

Jim Harper - Identity Crisis: Identity and Public Policy

Since the terrorist attacks of September 11, 2001, public officials have been under increasing pressure to employ identity in the name of security. Advancements in identification and surveillance technologies threaten privacy and civil liberties, enable identity fraud, and subject people to unwanted observation. Jim Harper of the Cato Institute discusses his book, Identity Crisis: How Identification is Overused and Misunderstood, a superb primer on identification, identification theory, and identity policy.
      details...

Greg Pierson - Security, Identity, and DRM

As issues of fraud and other similar activities continue to occur in online settings, businesses and organizations must come up with ways to secure data and establish methods to verify identities. Greg Pierson, President/CEO of Iovation, Inc. discusses these issues with Denise Howell. His company has developed methods to establish a "digital identity" for individual devices. He also discusses upcoming rules issued by the Federal Financial Examination Council regarding customer authentication.
      details...

Dan Kuykendall - PodPress

When he's not developing security solutions for web applications, Dan Kuykendall is talking about application security in his Mighty Seek podcast. And when he's not doing that, he's enhancing PodPress, a powerful plugin for the WordPress blog platform, which has become very popular in the podcasting community. Michael Geoghegan talks to Dan about his previous development projects, how he got involved in podcasting, and what PodPress has to offer podcasters.
      details...

Mark Bregman - The Dilemma of Innovation

As we enter the next era of software, market leaders are faced with a dilemma. Early innovators can soon become victims of their own success, bound by the demands of a large customer base. Meanwhile, startups and upstarts gain the edge in the innovation space. In this talk, Mark Bregman shares his insights and Symantec's vision for maintaining leadership while driving innovation to face the challenges of Security 2.0.
      details...

Marc Hedlund - Future-Proofing Your Privacy

It's hard enough protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. But as storage costs plummet and investment in search technology soars, what does the future hold for the data we're creating right now? How can we best protect our future selves from the quiet hard drives of today, and what might it mean to have an "open data" movement?
      details...

Alan Cox - Computer Security, The Next 50 Years

Security and validation are critical issues in computing, and the next fifty years will be harder than the last. There are a number of proven programming techniques and design approaches which are already helping to harden our modern systems, but each of these must be carefully balanced with usability in order to be effective. In this talk, Alan Cox, fellow at Red Hat Linux, explores the future of what may be the biggest threat facing software engineers, the unverified user.
      details...

Gary McGraw - Software Security

Security is not a feature - it's a requirement for today's software. According to Gary McGraw, the good news about software security is that we know how to do it, but the bad news is that we aren't. In this interview with Sondra Schneider, Dr. McGraw describes how to build secure software and what the security challenges are for the software industry.
      details...

Steve Gibson - Internet Privacy

Recently, the news has reported that the US Department of Justice has requested user information from some major internet search engines and service providers. In this conversation, Larry Magid talks with internet security expert Steve Gibson about the ramifications of these requests. They talk about what is possible and, more importantly, what is likely to be learned about an individual's surfing habits.
      details...

Ed Amoroso - Tracking the Attackers

Businesses should book software not as an asset, but as a liability. That's just one of Ed Amoroso's provocative ideas. Like medicine, software engineering should require "years of tortured residency." Homeland Security should work with hackers to fight terrorism. We should discard our firewalls and let broadband carriers filter attacks in the cloud. In this interview with Sondra Schneider, the AT&T CSO also describes AT&T's 24x7 TV network for security professionals.
      details...

Daniel Golding and Trent Henry - Security and Network Perspectives on Spam

Spam is a daunting challenge for many enterprises. With some estimates of lost productivity costs in the US at $10 billion ($50 billions worldwide) and growing risks of security and reputation at stake, many Enterprise IT Departments struggle with spam on a daily basis. However, the spam outlook is not all bad. Burton Group Senior Analysts Trent Henry and Daniel Golding discuss some suggested best practices in dealing with spam and claim that, as hard as it might be to believe it, we're winning. [Burton Group's Catalyst 2005 audio from IT Conversations]
      details...
This page shows 31 to 40 of 67 total podcasts in this series.
<<Newer | 1- | 11- | 21- | 31- | 41- | 51- | 61- | Older>>