The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
…
continue reading
Jon Collins talks to Dan Kaminsky.By Infosecurity Europe
…
continue reading
Jon Collins talks to David Lacey.By Infosecurity Europe
…
continue reading
Jon Collins talks to Paul Dorey.By Infosecurity Europe
…
continue reading
Jon Collins talks to Phil Zimmerman .By Infosecurity Europe
…
continue reading
Brian McKenna talks to Marcus Ranum on cyberwarfare.By Infosecurity Europe
…
continue reading
Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry.By Infosecurity Europe
…
continue reading
Gerry O'Neill on whether effective information security is about people or technology.By Infosecurity Europe
…
continue reading
1
Blended Social Engineering and IT Based Attacks
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30
Peter Wood talks about IT based attacks through social engineering.By Infosecurity Europe
…
continue reading
Jon Collins speaks to Fred Piper.By Infosecurity Europe
…
continue reading
Jon Collins speaks to Alan Paller.By Infosecurity Europe
…
continue reading
Jon Collins speaks to Alan Paller.By Infosecurity Europe
…
continue reading
Jon Collins speaks to Adam Laurie.By Infosecurity Europe
…
continue reading
Jon Collins speaks to Bruce Schneier.By Infosecurity Europe
…
continue reading
At a time when confidence in the Government’s ability to protect private information is at an all time low and identity cards and mass personal informatics are getting ever closer to introduction - Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary about some of the concerns for bus…
…
continue reading
1
Can Security Keep Pace with Mobilisation and Convergence?
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20
2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. a…
…
continue reading
1
Can Security Keep Pace with Mobilisation and Convergence? (enhanced)
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20
2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. a…
…
continue reading
In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcas…
…
continue reading
1
Securely Managing Unified Communications (enhanced)
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14
In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcas…
…
continue reading
The proliferation of laptop usage by employees has thrown companies open to a whole range of security threats from outright theft to illegal wireless access. In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use, and give advice on how to reduce your vulnerabilities.…
…
continue reading
1
Social Networking: Threat or Opportunity?
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32
With ever increasing numbers of employees now having a profile on a social networking site, this interview with Maury Shenk, Head of European Legal Programme, SANs Institute, looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate informa…
…
continue reading
1
Wireless Security: Top Tips to Mitigating Threats
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43
Recent high profile security breaches have shown just how vital wireless security can be, but organisations often have little control of their employees' wireless activities, a poor understanding of the potential threats across the organisation and little protection in place to detect, prevent and locate breaches. This podcast features Paul Lawrenc…
…
continue reading