Best Caleb Barlow podcasts we could find (Updated January 2019)
Related podcasts: Ibm Security Sametime X-force Unified Communications Caleb Barlow Cyber Security Ibm Security Mobile Technology Tech  
Caleb Barlow public [search 0]
×
Join millions of Player FM users today to get Caleb Barlow news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives ...
 
Loading …
show series
 
Today, IBM made a series of announcements, including the planned acquisition of Resilient Systems, Inc., that will aim to provide organizations with a proactive, comprehensive approach to respond to cyber breaches more quickly and effectively across consulting, services and products. With Resilient Systems, a leader in incident response, IBM wi ...…
 
One of the most dominant trends observed in the cybercrime during 2015 was the spread of organized crime groups to new territories. Using banking Trojans to attack banks in new geographies is a significant step because it is considered to be part of the malware’s evolution. Before they can venture into countries they never targeted before, crim ...…
 
Self-encrypting hard drives (SEDs) have been dubbed the security industry’s best-kept secret, but is the data inside really secure? With its ability to accelerate the drive-redeployment process, SEDs have been rising in popularity. Tune into this podcast to hear Rick Robinson, IBM Security Product Manager of Data Security, examine the security ...…
 
Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Linux or Windows) organizations get many of the benefits of a VM without the overhead of a hypervisor. S ...…
 
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When wi ...…
 
Organizations are constantly faced with evolving mobile technologies as well as finding new ways to secure them. The challenge is determining which mobile security strategy best fits your company's needs now and in the future. In this session, you will discover the key considerations for deploying a mobile security strategy based on your securi ...…
 
Today every organization faces its cyber security challenges, but to better balance the scales we need to extend access to cyber security and streamline how security practitioners can collaborate on everything from security best practices to advanced threat information and from security incident detection to incident response.…
 
The innovation in the mobile banking space is moving at a blistering pace. End users require more convenience and flexibility. They want information at their fingertips. They want speed. They want accuracy. And they want…security. And balancing user experience and cyber crime prevention can be challenging. This podcast featuring Danny Piangerel ...…
 
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/dating ...…
 
Enhanced levels of data encryption on Smartphones have been applauded by data privacy advocates but law enforcement has expressed concerns about the ability to get access to data on a smart phone while investigating a crime. But what about the enterprise? Are these new forms of encryption a good thing or a bad thing for our corporate data? In t ...…
 
Earlier today a new form of malware was disclosed that is targeting iOS devices. Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantag ...…
 
In this podcast, Caleb talks with Jukka Alanen about how mobile apps are under attack, how apps are being exploited by hackers, and what organizations can do safeguard their brands, data, IP, and revenue while developing and releasing new mobile apps. Already 78% of Top 100 iOS and Android apps have been found as hacked, rogue versions, and ind ...…
 
Did you know there are approximately 9 billion devices, assets, and ‘things’currently connected to a network? Over the next decade that number is expected to increase significantly with estimates ranging from 50 billion to nearly 1 trillion! It's about engine control units on industrial vehicles, track signaling equipment on railways, water pum ...…
 
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been ...…
 
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and ...…
 
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages. Now, for most organizations, the most severe data breaches are coming ...…
 
As security professionals scramble to address the potential impact of Heartbleed we take a moment to pause and describe what Heartbleed is all about, how it occurred and practical advice on how to address the risk on your systems. Michael Hamelin from the IBM X-Force research team joins us to describe this in plain english and give you some pra ...…
 
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance - making them a target for attack as your enterprise continues to grow and change. Demonstrating compliance for your industry can be complex ...…
 
Learn of the increased focus placed on data security, compliance, and privacy to deal with the constant threats to enterprises, and how a leading industry actor effectively makes data protection possible in their growing diverse IT ecosystem. As company's environments become more open and complex, sensitive data can be found not only on interna ...…
 
Cryptography is a necessary component to for protecting data, regulatory compliance, and mitigating the risk of breaches, for government, retail, financial, and healthcare companies. Recent events in the news show how the a compromise of 38 million accounts could have been much worse if encryption had not been adopted as part of the data manage ...…
 
Today's information security threats don't stand still. They persevere, adapting to traditional defenses, changing form and appearance quickly and frequently until they succeed in their mission --- to own your most critical assets. Without defense mechanisms that can accurately detect these types of mutating threats, they will win --- lurking l ...…
 
It's all mandatory. Nothing is voluntary. The rule is if you store, process, or transmit credit card data you must be compliant with the PCI standards. And that's a global rule. In this podcast, security experts will engage in a lively discussion about PCI Compliance and how the planned publication date of PCI DSS and PA DSS version 3.0 will ef ...…
 
Today IBM announced a definitive agreement to acquire Fiberlink Communications, a mobile management and security company. Join executives from Fiberlink and IBM - Wing To, Caleb Barlow, Phil Buckellew and Chris Clark moments after the announcement to discuss the Fiberlink solution, and how IBM will extend its bring your own device (BYOD) capabi ...…
 
2013 is well on its way to be another record year for cyber intrusions, keeping security as a topic in every corporation’s boardroom and in every government agency. How many vulnerabilities did your security team find scanning today, last month, or this year? And how many were high risk? In the first six months of 2013, the IBM X-Force Research ...…
 
The IBM X-Force Threat Research Team has raised the Internet Threat Level to Level 2 following a Microsoft Security Advisory detailed a zero day vulnerability that affects all version of Microsoft Internet Explorer. The problem lies in the way the IE code handles memory that has been released or not properly allocated. This could potentially co ...…
 
With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming f ...…
 
August 15, 2013 – Today IBM announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. Join Caleb Barlow, Marc Van Zadelhoff and Yishay Yovel moments after the announcement to discuss the Trusteer solution, the formation of a new IB ...…
 
Denial of Service (DDoS) attacks have been around awhile. Mafia Boy, a high school student, allegedly made history by attacking big name companies like Yahoo and a week later Ebay, CNN, Amazon and Dell back in the cyber-crime dark ages in the year of 2000. Over time, new motivations such as hacktivism have made DDoS the weapon of choice as it s ...…
 
In this podcast we review the newly published Gartner Magic Quadrant for Application Security Testing (AST) with our subject matter expert Diana R. Kelley (Application Security Strategist, IBM Security Systems). The live discussion will cover the value for customer using this new combined SAST and DAST MQ report, how and when security as a serv ...…
 
Are you going to the Black Hat Security Conference starting on July 27th in Vegas? Here's a preview of what our team will be doing and the sessions that can help you build your schedule. In this podcast Caleb gives each of the IBM speakers a chance to give a quick commercial of their session so listen to this in the car or on the airplane on th ...…
 
Gain a better understanding of the issues surrounding cloud and mobile security. Today’s businesses want to leverage the benefits and lower costs of Cloud computing while embracing the flexibility and exponential growth in mobile devices. Executives cite security as the biggest concern for embracing cloud and mobile technology. In this podcast ...…
 
Broadcasting live from Christchurch New Zealand, join Caleb Barlow, Luciana Camargo, John Fennell, Drew Clark, Stephen Dill and Erick Brethenoux on a special assignment as part of the Smarter Cities Challenge. The city of Christchurch recently suffered a series of earthquakes which caused massive damage in the central city and some suburban are ...…
 
Get the Report Here: http://bit.ly/xreport Twice a year security professionals pause to read their own report on the trends and risks affecting IT Security. Produced by the IBM X-Force research team, this report investigates the state of cyber security, recent attacks along with improvements seen in vulnerability disclosures. If you are a CIO, ...…
 
The electric grid is one of man's oldest and largest machines, and while it's beginning to show it's age in some ways, it's also being modernized with sensors and advanced communications technologies at a rapid pace. In the wake of Stuxnet and more recently the powerful Shamoon attacks on energy companies in the Middle East, governments around ...…
 
On the hunt for interesting innovations Caleb Barlow walks thru the AGC Partners Investor Conference and the first day of the RSA Security Conference live from San Francisco California. Also learn about the latest news on IBM AppScan 8.7 for iOS which was named one of the 25 hottest products at RSA by NetworkWorld Magazine. http://bit.ly/V4cc2v ...…
 
Going to Pulse in Las Vegas March 3-6? Here's a preview of all the Security focused sessions from the actual presenters and product managers in the "Pulse Protect" track. If you are going to Pulse this is an opportunity to build your schedule and get some more information on the best sessions as you build your schedule. . http://www-01.ibm.com/ ...…
 
IBM Raises its Internet Threat Level to AlertCon 2 In what could arguably be just about the worse time of year for such a discovery, Microsoft has confirmed the existence of a zero day vulnerability that affects Internet Explorer versions 6, 7, and 8. The vulnerability is due to "the way that Internet Explorer accesses an object in memory that ...…
 
The holiday season is also the high season for computer crime. Don’t get “scrooged” while making your on-line purchases, surfing the web and connecting with friends on-line this holiday. In this podcast Jack, Caleb and Vijay give you some of their best tips on staying safe this holiday season that you can share with your kids, parents and friends.…
 
This week, IBM released its 2012 Tech Trends Report Survey, along with the alarming finding that only 1 in 10 organizations currently possess the skills needed to effectively apply advanced technologies, including business analytics, mobile computing, cloud computing and social business, all of which are experiencing high demand growth and are ...…
 
The threat landscape is getting more sophisticated with sponsored cyber hackers using synchronized attacks across multiple vectors, like Advanced Persistent Threats (APT). The business demand for Mobility, Cloud and BigData creates new vulnerabilities to facilitate further creative attacks. In this environment, what is needed is an effective in ...…
 
Caleb talks with Joe DiPietro about practical security controls for databases and big data environments. The following aspects of security and compliance will be covered: - what to monitor - how to discover sensitive information - validating security controls & database policies - what role does the business owner play in the security framework ...…
 
In this podcast Caleb talks with mobile security guru Vijay Dheap about how to take a holistic approach to deploying mobile security solutions that safeguard the operational priorities of the business.
 
As more organizations consider embracing cloud, whether its designing a new cloud service, deploying data and workloads to the cloud, or consuming information from cloud-based services, a holistic view of security and a strong understanding of risks associated with each domain (people, data, applications, infrastructure) are necessary to keep u ...…
 
Welcome to October and to National Cybersecurity Awareness Month in the U.S. As security executives, our efforts to increase awareness -- whether among our executive teams, our partners, or our employee base -- should serve as a proxy for our effectiveness in improving security overall. During the month, each week will bring a new podcast aroun ...…
 
Welcome to October and to National Cybersecurity Awareness Month in the U.S. As security executives, our efforts to increase awareness -- whether among our executive teams, our partners, or our employee base -- should serve as a proxy for our effectiveness in improving security overall. During the month, each week will bring a new podcast aroun ...…
 
Welcome to October and to National Cybersecurity Awareness Month in the U.S. As security executives, our efforts to increase awareness -- whether among our executive teams, our partners, or our employee base -- should serve as a proxy for our effectiveness in improving security overall. During the month, each week will bring a new podcast aroun ...…
 
IBM Raises its Internet Threat Level to AlertCon 2 The IBM X-Force has been monitoring the situation with regards to Financial Institutions for a few weeks now. We are raising our AlertCon to 2 as the credibility of several threats has increased, and we want to highlight these threats to the Financial Industry. Our Assessment from Thursday, Oct ...…
 
There is no denying the natural attractiveness of being able to do whatever we want, whenever we want to. In technology, particularly lately, that has come to result in a trend to move as much of our technical toolset, formerly consigned to our desktop, and then our laptops, onto our truly mobile devices, most notably our phones. The amount of ...…
 
The IBM X-Force Threat Research Team will release their 2012 Mid Year Trend and Risk Report on September 20th. In this LIVE interview you will hear directly from research team shortly after the report is released to the public. What's coming? Well.. our X-Force team is seeing executives responsible for the protection of corporate, customer, emp ...…
 
Google login Twitter login Classic login