The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
…
continue reading
Jon Collins talks to Dan Kaminsky.על ידי Infosecurity Europe
…
continue reading
Jon Collins talks to David Lacey.על ידי Infosecurity Europe
…
continue reading
Jon Collins talks to Paul Dorey.על ידי Infosecurity Europe
…
continue reading
Jon Collins talks to Phil Zimmerman .על ידי Infosecurity Europe
…
continue reading
Brian McKenna talks to Marcus Ranum on cyberwarfare.על ידי Infosecurity Europe
…
continue reading
Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry.על ידי Infosecurity Europe
…
continue reading
Gerry O'Neill on whether effective information security is about people or technology.על ידי Infosecurity Europe
…
continue reading
1
Blended Social Engineering and IT Based Attacks
10:30
10:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:30
Peter Wood talks about IT based attacks through social engineering.על ידי Infosecurity Europe
…
continue reading
Jon Collins speaks to Fred Piper.על ידי Infosecurity Europe
…
continue reading
Jon Collins speaks to Alan Paller.על ידי Infosecurity Europe
…
continue reading
Jon Collins speaks to Alan Paller.על ידי Infosecurity Europe
…
continue reading
Jon Collins speaks to Adam Laurie.על ידי Infosecurity Europe
…
continue reading
Jon Collins speaks to Bruce Schneier.על ידי Infosecurity Europe
…
continue reading
1
David Blunkett on Information Security
20:29
20:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
20:29
At a time when confidence in the Government’s ability to protect private information is at an all time low and identity cards and mass personal informatics are getting ever closer to introduction - Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary about some of the concerns for bus…
…
continue reading
1
Can Security Keep Pace with Mobilisation and Convergence?
10:20
10:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:20
2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. a…
…
continue reading
1
Can Security Keep Pace with Mobilisation and Convergence? (enhanced)
10:20
10:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:20
2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. a…
…
continue reading
1
Securely Managing Unified Communications
7:14
7:14
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:14
In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcas…
…
continue reading
1
Securely Managing Unified Communications (enhanced)
7:14
7:14
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:14
In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcas…
…
continue reading
The proliferation of laptop usage by employees has thrown companies open to a whole range of security threats from outright theft to illegal wireless access. In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use, and give advice on how to reduce your vulnerabilities.…
…
continue reading
1
Social Networking: Threat or Opportunity?
10:32
10:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:32
With ever increasing numbers of employees now having a profile on a social networking site, this interview with Maury Shenk, Head of European Legal Programme, SANs Institute, looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate informa…
…
continue reading
1
Wireless Security: Top Tips to Mitigating Threats
9:43
9:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:43
Recent high profile security breaches have shown just how vital wireless security can be, but organisations often have little control of their employees' wireless activities, a poor understanding of the potential threats across the organisation and little protection in place to detect, prevent and locate breaches. This podcast features Paul Lawrenc…
…
continue reading