Podcasts

  • Top 5 leading-edge authentication technologies

    Listen to this podcast to learn about the top five leading edge authentication technologies, including facial recognition software, HSPD12 Smart Card, Authentication as a Service, personal portable security devices, and the credit card OTP form factor.

  • Making NAC work with your existing security tools

    This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your various Network Access Control (NAC) products and other security and networking tools on your network.

  • Podcast: Fact or fiction -- Am I a bot or not?

    Learn how to tighten email security policies, educate users about the dangers of seemingly harmless messages, and eliminate email accounts that have been taken over by bots.

  • Top five ways to keep users safe from today's Web-based threats

    42% of security professionals surveyed by SearchSecurity.com said they'll be spending more time on threat management in 2008 than they did in 2007. This Podcast details the top five ways to defend against today's Web-based threats and discusses how to recognize unique botnet attacks and how to prevent your network from becoming a launching pad for spam and worms. In this podcast, learn about link-scanning tools, browser configurations and other techniques that can make a major difference in the security of your network.

  • Countdown: Top five ways to sell NOC/SOC integration

    NOC/SOC integration offers enterprises a number of benefits, but time and trouble of making the conversion is enough to make executives wary. In this podcast, learn key insights about the business value gained by fostering NOC/SOC integration. Some of the answers may surprise you, as it's not just for compliance anymore.

  • Podcast: Exchange security -- A quick primer

    Today's complex Exchange environments are costly and difficult to protect and secure from threats like spam, spyware, malware and viruses. This 12-minute expert podcast features a summary of the key issues pertaining to the security of Microsoft Exchange in enterprise environments.

  • Countdown: Top 5 consumer authentication technologies on the market today

    In late 2005 the Federal Financial Institutions Examination Council (FFIEC) issued a guidance stating single-factor authentication was no longer adequate for securing online banking transactions. The guidance did not specify what types of technologies would meet the requirement, but many vendors have scrambled to come up with cost-effective and easy product offerings that can be deployed to the masses. This Podcast will countdown the top 5 vendor options available when it comes to consumer Web authentication.

  • Fact or fiction: Don't forget about your intellectual prop

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Check out the expert Podcast featured here and learn more about creating an effective enterprise data protection framework for your organization. Personally-identifiable information (PII) must be protected as mandated by a myriad of regulations. But some organizations overlook the need to protect intellectual property. In this Podcast, we'll explain some of the common misunderstandings about the legal protections for trade secrets and offer you a set of best practices to get started.

  • Fact or fiction: Pros and cons of database encryption

    According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network. When you are encrypting data within a database you have two basic choices: encrypting the entire database or encrypting specific fields at the data level. This podcast explains the pros and cons of each approach.

  • Fact or fiction: Building and enforcing DLP policies

    Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. This expert podcast gives advice for developing comprehensive DLP policies for locking down the most valuable information on your organization's network, as well as strategies and tactics for enforcing those policies with users.

  • Information security podcasts: 2007 archive

    Listen to past editions of our information security podcasts.

  • Podcast: Countdown --Top 5 technologies to help battle the new spam threat

    In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.

  • Kumbaya: How the storage and security teams can work together

    Typically the storage and security teams of a company rarely work together. Unfortunately, as a result most organizations miss out on the benefits that come with storage-security cooperation. This Podcast features a countdown of the top 5 tips for getting your storage and security teams to work together. Listen to this Podcast today and learn why it is important to have both storage and security in sync, and how you can convince your storage counterparts that cooperation is the best approach. Check out this Podcast and hear Perry Carpenter, CISSP, CIPP and Principle of Security Renaissance discuss what it takes for your company's storage and security teams to effectively work together. Learn how to secure your stored data by having your storage and security teams cooperate and listen to this Podcast now.

  • Countdown: Plugging the dam -- Understanding where and how content leaks

    This expert Podcast counts down the top 5 different use cases in which data can leak as a result of outdated data handling policies, and what you can do to make sure these situations don't put your organization in an exposed position.

  • Countdown: Top 5 next-generation messaging attacks that antivirus can't catch

    In this Podcast, expert Mike Rothman counts down the top five next-generation messaging attacks that antivirus can't catch, and tells you how to stop them.

  • Podcast: More or less, a browser security comparison

    Expert Peter Gregory offers a browser security comparison, Firefox vs. IE 7, as well as advice on how to decide which is right for your organization.

  • Smart shopper: What to look for in password management and provisioning

    Password management vendors are getting into the full-blown provisioning game, and traditional vendors are adding Windows logon extensions to facilitate self-service-a hallmark of a password management-only solutions in the past. As these two markets evolve and merge, how does the shift affect security buying decisions? What should buyers look for? This podcast offers some answers to these important questions and more.

  • Top 5 questions to ask when shopping for a compliance product

    The Podcast featured here examines what it takes to implement an effective security and compliance framework.

  • Countdown: Top 5 mobile spyware misconceptions

    This 10-12 minute podcast will count down the top 5 things people may falsely believe or not know about mobile spyware.

  • Podcast: Fact or fiction -- The future of email attacks

    What will the future hold regarding email attacks? In this expert podcast, Tom Bowers will confirm or debunk a number of common beliefs about what's coming next.

  • Podcast: Platform protection -- Security issues for mobile devices

    This 10-minute podcast features a Q&A-style back-and-forth interview with Lisa Phifer, a renowned instructor and conference speaker in the realm of mobile security. The podcast summarizes the security issues facing today's popular mobile device platforms, from Windows Mobile PDAs to BlackBerry smartphones. Find out where you can leverage recently improved operating system security measures and what may be the single most important security measure you can take to secure your organization's devices.

  • Podcast: Top 5 quick tips for safer instant messaging

    Michael Cobb of Cobweb Applications counts down five quick tips that can secure IM in the enterprise. Cobb discusses account naming rules, acceptable use policy, instant messaging encryption and much more.

  • Information security podcasts: 2006 archive

    Listen to past editions of our information security podcasts.

  • Information security podcasts: 2005 archive

    Listen to past editions of SearchSecurity.com's Security Wire Weekly podcast, offering news, interviews and current events in the information Security market.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close