Security Intelligence Podcast

Welcome to the Security Intelligence Podcast, where security experts share analysis and insights about the industry. Join security influencers, IBM thought leaders, business partners and other industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com.

https://securityintelligence.com

subscribe
share


 
 

      The Mobility Breakup Hour: From Your Ex To Your Next


      Security Intelligence is pleased to sponsor this episode of the Mobility Breakup Hour. Listen in as host Rob Patey advises callers on their mobile security woes, ranging from relationships that are no longer fulfilling to those that have devolved into sordid love triangles involving multiple tools and solutions that refuse to communicate with one another. If you're looking for an MDM solution you can call "the one," this is the podcast for you. Listen now, then download the 2017 Gartner...


      share





      20m
       

      Quick Take: Vijay Dheap Highlights the Benefits of Cognitive Technology


      This Quick Take podcast features Vijay Dheap, Program Director for Cognitive, Cloud, Analytics at IBM Security. Listen now to learn how cognitive security technologies can solve gaps in information, speed and accuracy. You'll also discover what businesses can expect to achieve when adopting cognitive solutions. To learn more, read Vijay's blog, "IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work" [ibm.co/2x2yPtQ], visit the QRadar Advisor with Watson homepage...


      share





      4m
       

      Cybersecurity Isn't Rocket Science: NCSAM Insights From X-Force Red


      October is National Cyber Security Awareness Month (NCSAM) as well as Halloween season. In honor of this this confluence of events, Space Rogue and Videoman, both of IBM X-Force Red, have come together for a conversation about some scary security blunders and, because we don't want our listeners to have nightmares, some tips for resurrecting your security strategy. To learn more about X-Force Red or to schedule a demo, visit: ibm.co/2wxeb56. Or listen to another podcast on National Cyber...


      share





      9m
       

      Quick Take: Bob Stasio Talks Cognitive Security And Threat Hunting


      Have 5 minutes? That’s plenty of time for this episode of Quick Time! Listen now to hear Bob Stasio, Program Director of Cyber Threat Hunting and Analysis at IBM Security, discuss the cognitive security glide path and share his thoughts on the future of cyber threat hunting. To learn more, read Bob’s recent blog on the cognitive security glide path: https://ibm.co/2yKfhuu.


      share





      3m
       

      DCH 06 We're All In This Together: National Cyber Security Awareness Month


      Episode 6 of the monthly "Deciphering the Cyber Headlines with Paul Ferrillo and Chris Veltsos" series. October is National Cyber Security Awareness Month (NCSAM), and this podcast kicks off 4 weeks of Security Intelligence content [https://ibm.co/2hKTBuZ] dedicated to the role we all play in making the internet safer. Listen now to hear a spirited discussion on the various themes of this year's NCSAM campaign, including "Cybersecurity in the Workplace is Everyone’s Business" and "...


      share





      22m
       

      IBM and Senetas: Providing Secure Data Collaboration In An Insecure World


      In this podcast, Julian Fay, CTO of Senetas, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about data protection and secure data collaboration. Listen now to discover the unique capabilities of Senetas' enterprise-grade SureDrop file-sharing platform [http://bit.ly/2xNVtcw], including full encryption, data sovereignty and key management control. You'll also hear about how IBM and Senetas are working together to promote secure...


      share





      13m
       

      [Encore] The 5 Indisputable Facts of IoT Security


      For the first time, listen to the complete "5 Indisputable Facts of IoT Security" podcast series from earlier this year as a single hour-long podcast. Fact 1. Devices will operate in hostile environments; Fact 2. Software security will degrade over time; Fact 3. Shared secrets do not remain secret; Fact 4. Weak configurations will persist; Fact 5. As data accumulates, exposure issues will increase. Listen now for the complete insights from our featured panel of IBMers: James Murphy,...


      share





      1h2m
       

      [Encore] The Biggest Security Risks In Health Care IT Systems


      Should health care organizations be mandated to have more sophisticated security programs than other industries? Does HIPAA compliance have any security merit? In this podcast Shahid Shah, CEO of Netspective, discusses these and other thought-provoking questions about the state of U.S. health care security with David Chou, Chief Information and Digital Officer at Children's Mercy Hospital in Kansas City, Missouri. To learn more about health care security, visit ibm.co/2ledABQ.


      share





      29m
       

      Better Than Mr. Robot: Penetration Testing with X-Force Red


      In this episode of our ongoing series featuring members of the IBM X-Force Red team, North American Regional Lead Steve Ocepek offers a glimpse into the world of elite penetration testing. While he can't reveal all the tricks of the trade, Steve does discuss how the X-Force Red brand has grown and evolved over the past year, what makes an ideal candidate to join the team and why X-Force Red takes a collaborative, team-oriented approach to pen testing. To learn more about X-Force Red or to...


      share





      11m
       2017-09-19

      DCH 05 Understanding The Media Hacks Of 2017


      Episode 5 of the monthly "Deciphering the Cyber Headlines" series. Summer is meant to be a time for blockbuster movies and TV spectaculars, but were hackers the big winner of the 2017 season? In this podcast, Paul and Chris discuss the media hacks of the past few months, emphasizing the role played by third-party vendors. To learn more about how identity and access management solutions can help protect your sensitive data, read the IBM white paper: https://ibm.co/2wWPyiZ. And for more...


      share





      16m
       2017-09-12