Podchaser Logo
Home
Security, Mobile & Cloud - Caleb Barlow

Archive

Security, Mobile & Cloud - Caleb Barlow

A Technology podcast
Good podcast? Give it some love!
Security, Mobile & Cloud - Caleb Barlow

Archive

Security, Mobile & Cloud - Caleb Barlow

Episodes
Security, Mobile & Cloud - Caleb Barlow

Archive

Security, Mobile & Cloud - Caleb Barlow

A Technology podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Security, Mobile & Cloud

Mark All
Search Episodes...
Today, IBM made a series of announcements, including the planned acquisition of Resilient Systems, Inc., that will aim to provide organizations with a proactive, comprehensive approach to respond to cyber breaches more quickly and effectively a
One of the most dominant trends observed in the cybercrime during 2015 was the spread of organized crime groups to new territories.Using banking Trojans to attack banks in new geographies is a significant step because it is considered to be par
Security, Mobile & Cloud - Caleb Barlow
Self-encrypting hard drives (SEDs) have been dubbed the security industry’s best-kept secret, but is the data inside really secure?With its ability to accelerate the drive-redeployment process, SEDs have been rising in popularity. Tune into thi
Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Li
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to you
Organizations are constantly faced with evolving mobile technologies as well as finding new ways to secure them. The challenge is determining which mobile security strategy best fits your company's needs now and in the future. In this session,
Today every organization faces its cyber security challenges, but to better balance the scales we need to extend access to cyber security and streamline how security practitioners can collaborate on everything from security best practices to ad
The innovation in the mobile banking space is moving at a blistering pace.  End users require more convenience and flexibility. They want information at their fingertips. They want speed. They want accuracy. And they want…security.  And balanci
Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provide
Enhanced levels of data encryption on Smartphones have been applauded by data privacy advocates but law enforcement has expressed concerns about the ability to get access to data on a smart phone while investigating a crime.  But what about the
Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variant
In this podcast, Caleb talks with Jukka Alanen about how mobile apps are under attack, how apps are being exploited by hackers, and what organizations can do safeguard their brands, data, IP, and revenue while developing and releasing new mobil
Did you know there are approximately 9 billion devices, assets, and ‘things’currently connected to a network?  Over  the next decade that number is expected to increase significantly with estimates ranging from 50 billion to nearly 1 trillion! 
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach.  We will introduce a new framework
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated externa
As security professionals scramble to address the potential impact of Heartbleed we take a moment to pause and describe what Heartbleed is all about, how it occurred and practical advice on how to address the risk on your systems. Michael Hamel
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance - making them a target for attack as yo
Learn of the increased focus placed on data security, compliance, and privacy to deal with the constant threats to enterprises, and how a leading industry actor effectively makes data protection possible in their growing diverse IT ecosystem. A
Cryptography is a necessary component to for protecting data, regulatory compliance, and mitigating the risk of breaches, for government, retail, financial, and healthcare companies. Recent events in the news show how the a compromise of 38 mil
Today's information security threats don't stand still.  They persevere, adapting to traditional defenses, changing form and appearance quickly and frequently until they succeed in their mission --- to own your most critical assets.   Without d
It's all mandatory. Nothing is voluntary. The rule is if you store, process, or transmit credit card data you must be compliant with the PCI standards. And that's a global rule.In this podcast, security experts will engage in a lively discuss
Today IBM announced a definitive agreement to acquire Fiberlink Communications, a mobile management and security company. Join executives from Fiberlink and IBM - Wing To, Caleb Barlow, Phil Buckellew and Chris Clark moments after the announcem
2013 is well on its way to be another record year for cyber intrusions, keeping security as a topic in every corporation’s boardroom and in every government agency.  How many vulnerabilities did your security team find scanning today, last mo
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features