Best Sametime podcasts we could find (Updated January 2019)
Related podcasts: Ibm Tech Ciftetelli Chiftetelli Bendir Bellydancing Baglama Akdeniz Cappadocia Quickplace Balkan Domino Bellydance Hawthorn Armenian Notes Belly Lotus Clarinet Portal  
Sametime public [search 0]
×
Join millions of Player FM users today to get Sametime news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
S
Sound of Istanbul
Monthly
 
Even if you lived in Turkey or traveled to Turkey for vacation or business, I'm hoping this music will pleasantly surprise and entertain you. There is so much ethnic and social diversity in the world. Freedom, social justice and human rights aren’t enough to bring happiness to people. Every social or ethnic community has a need to love and be loved. What I say sounds like Bob Marley's ideas but it isn't all that different from the principles of Kemal Ataturk (founder of modern Turkey) or wor ...
 
Lotus software administration, industry reviews and podcasts covering Lotus Notes, Domino, Sametime, Quickr/Quickplace, Connections and tons more
 
Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives ...
 
T
This Week in Lotus
Rare
 
The weekly roundtable discussion of all things Social, Collaboration, Technology and Community…
 
Loading …
show series
 
Episode 115, recorded on Tuesday 30th August 2016. We discuss the MWLUG 2016 conference, the future of IBM Domino and xPages development, what Project Toscana means for all of us, and the IDC announcement that IBM leads the Social Business marketplace for the 7th consecutive year. Oh and on our final TWiL ever, we share an exciting announcement ...…
 
Today, IBM made a series of announcements, including the planned acquisition of Resilient Systems, Inc., that will aim to provide organizations with a proactive, comprehensive approach to respond to cyber breaches more quickly and effectively across consulting, services and products. With Resilient Systems, a leader in incident response, IBM wi ...…
 
One of the most dominant trends observed in the cybercrime during 2015 was the spread of organized crime groups to new territories. Using banking Trojans to attack banks in new geographies is a significant step because it is considered to be part of the malware’s evolution. Before they can venture into countries they never targeted before, crim ...…
 
Self-encrypting hard drives (SEDs) have been dubbed the security industry’s best-kept secret, but is the data inside really secure? With its ability to accelerate the drive-redeployment process, SEDs have been rising in popularity. Tune into this podcast to hear Rick Robinson, IBM Security Product Manager of Data Security, examine the security ...…
 
Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Linux or Windows) organizations get many of the benefits of a VM without the overhead of a hypervisor. S ...…
 
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When wi ...…
 
By IdoNotes@IdoNotes.com (Spiked Studio Productions).
 
Organizations are constantly faced with evolving mobile technologies as well as finding new ways to secure them. The challenge is determining which mobile security strategy best fits your company's needs now and in the future. In this session, you will discover the key considerations for deploying a mobile security strategy based on your securi ...…
 
Today every organization faces its cyber security challenges, but to better balance the scales we need to extend access to cyber security and streamline how security practitioners can collaborate on everything from security best practices to advanced threat information and from security incident detection to incident response.…
 
The innovation in the mobile banking space is moving at a blistering pace. End users require more convenience and flexibility. They want information at their fingertips. They want speed. They want accuracy. And they want…security. And balancing user experience and cyber crime prevention can be challenging. This podcast featuring Danny Piangerel ...…
 
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/dating ...…
 
Enhanced levels of data encryption on Smartphones have been applauded by data privacy advocates but law enforcement has expressed concerns about the ability to get access to data on a smart phone while investigating a crime. But what about the enterprise? Are these new forms of encryption a good thing or a bad thing for our corporate data? In t ...…
 
Earlier today a new form of malware was disclosed that is targeting iOS devices. Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantag ...…
 
In this podcast, Caleb talks with Jukka Alanen about how mobile apps are under attack, how apps are being exploited by hackers, and what organizations can do safeguard their brands, data, IP, and revenue while developing and releasing new mobile apps. Already 78% of Top 100 iOS and Android apps have been found as hacked, rogue versions, and ind ...…
 
Did you know there are approximately 9 billion devices, assets, and ‘things’currently connected to a network? Over the next decade that number is expected to increase significantly with estimates ranging from 50 billion to nearly 1 trillion! It's about engine control units on industrial vehicles, track signaling equipment on railways, water pum ...…
 
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been ...…
 
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and ...…
 
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages. Now, for most organizations, the most severe data breaches are coming ...…
 
As security professionals scramble to address the potential impact of Heartbleed we take a moment to pause and describe what Heartbleed is all about, how it occurred and practical advice on how to address the risk on your systems. Michael Hamelin from the IBM X-Force research team joins us to describe this in plain english and give you some pra ...…
 
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance - making them a target for attack as your enterprise continues to grow and change. Demonstrating compliance for your industry can be complex ...…
 
Learn of the increased focus placed on data security, compliance, and privacy to deal with the constant threats to enterprises, and how a leading industry actor effectively makes data protection possible in their growing diverse IT ecosystem. As company's environments become more open and complex, sensitive data can be found not only on interna ...…
 
Cryptography is a necessary component to for protecting data, regulatory compliance, and mitigating the risk of breaches, for government, retail, financial, and healthcare companies. Recent events in the news show how the a compromise of 38 million accounts could have been much worse if encryption had not been adopted as part of the data manage ...…
 
Today's information security threats don't stand still. They persevere, adapting to traditional defenses, changing form and appearance quickly and frequently until they succeed in their mission --- to own your most critical assets. Without defense mechanisms that can accurately detect these types of mutating threats, they will win --- lurking l ...…
 
It's all mandatory. Nothing is voluntary. The rule is if you store, process, or transmit credit card data you must be compliant with the PCI standards. And that's a global rule. In this podcast, security experts will engage in a lively discussion about PCI Compliance and how the planned publication date of PCI DSS and PA DSS version 3.0 will ef ...…
 
Today IBM announced a definitive agreement to acquire Fiberlink Communications, a mobile management and security company. Join executives from Fiberlink and IBM - Wing To, Caleb Barlow, Phil Buckellew and Chris Clark moments after the announcement to discuss the Fiberlink solution, and how IBM will extend its bring your own device (BYOD) capabi ...…
 
2013 is well on its way to be another record year for cyber intrusions, keeping security as a topic in every corporation’s boardroom and in every government agency. How many vulnerabilities did your security team find scanning today, last month, or this year? And how many were high risk? In the first six months of 2013, the IBM X-Force Research ...…
 
The IBM X-Force Threat Research Team has raised the Internet Threat Level to Level 2 following a Microsoft Security Advisory detailed a zero day vulnerability that affects all version of Microsoft Internet Explorer. The problem lies in the way the IE code handles memory that has been released or not properly allocated. This could potentially co ...…
 
With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming f ...…
 
August 15, 2013 – Today IBM announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. Join Caleb Barlow, Marc Van Zadelhoff and Yishay Yovel moments after the announcement to discuss the Trusteer solution, the formation of a new IB ...…
 
Denial of Service (DDoS) attacks have been around awhile. Mafia Boy, a high school student, allegedly made history by attacking big name companies like Yahoo and a week later Ebay, CNN, Amazon and Dell back in the cyber-crime dark ages in the year of 2000. Over time, new motivations such as hacktivism have made DDoS the weapon of choice as it s ...…
 
In this podcast we review the newly published Gartner Magic Quadrant for Application Security Testing (AST) with our subject matter expert Diana R. Kelley (Application Security Strategist, IBM Security Systems). The live discussion will cover the value for customer using this new combined SAST and DAST MQ report, how and when security as a serv ...…
 
Are you going to the Black Hat Security Conference starting on July 27th in Vegas? Here's a preview of what our team will be doing and the sessions that can help you build your schedule. In this podcast Caleb gives each of the IBM speakers a chance to give a quick commercial of their session so listen to this in the car or on the airplane on th ...…
 
Gain a better understanding of the issues surrounding cloud and mobile security. Today’s businesses want to leverage the benefits and lower costs of Cloud computing while embracing the flexibility and exponential growth in mobile devices. Executives cite security as the biggest concern for embracing cloud and mobile technology. In this podcast ...…
 
Broadcasting live from Christchurch New Zealand, join Caleb Barlow, Luciana Camargo, John Fennell, Drew Clark, Stephen Dill and Erick Brethenoux on a special assignment as part of the Smarter Cities Challenge. The city of Christchurch recently suffered a series of earthquakes which caused massive damage in the central city and some suburban are ...…
 
Get the Report Here: http://bit.ly/xreport Twice a year security professionals pause to read their own report on the trends and risks affecting IT Security. Produced by the IBM X-Force research team, this report investigates the state of cyber security, recent attacks along with improvements seen in vulnerability disclosures. If you are a CIO, ...…
 
The electric grid is one of man's oldest and largest machines, and while it's beginning to show it's age in some ways, it's also being modernized with sensors and advanced communications technologies at a rapid pace. In the wake of Stuxnet and more recently the powerful Shamoon attacks on energy companies in the Middle East, governments around ...…
 
On the hunt for interesting innovations Caleb Barlow walks thru the AGC Partners Investor Conference and the first day of the RSA Security Conference live from San Francisco California. Also learn about the latest news on IBM AppScan 8.7 for iOS which was named one of the 25 hottest products at RSA by NetworkWorld Magazine. http://bit.ly/V4cc2v ...…
 
Going to Pulse in Las Vegas March 3-6? Here's a preview of all the Security focused sessions from the actual presenters and product managers in the "Pulse Protect" track. If you are going to Pulse this is an opportunity to build your schedule and get some more information on the best sessions as you build your schedule. . http://www-01.ibm.com/ ...…
 
IBM Raises its Internet Threat Level to AlertCon 2 In what could arguably be just about the worse time of year for such a discovery, Microsoft has confirmed the existence of a zero day vulnerability that affects Internet Explorer versions 6, 7, and 8. The vulnerability is due to "the way that Internet Explorer accesses an object in memory that ...…
 
The holiday season is also the high season for computer crime. Don’t get “scrooged” while making your on-line purchases, surfing the web and connecting with friends on-line this holiday. In this podcast Jack, Caleb and Vijay give you some of their best tips on staying safe this holiday season that you can share with your kids, parents and friends.…
 
Google login Twitter login Classic login