Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, says executives are ignoring the problem of cyber security, and if they continue to do so the results will be catastrophic.
For two years, they watched and waited for opportunities to siphon money.
JD Sherry, vice president, technology and solutions, Trend Micro, tells to explain why businesses are struggling with cybercrime, what they can do prevent it and what companies can do to better to protect themselves and their employees Android devices.
JD Sherry, vice president, technology and solutions, Trend Micro, tells listeners why businesses are falling afoul of cybercrime, what they should be doing to prevent it, and how we might be helping hackers and not even realize it.
Terrorism as we knew it is changing. Jonathan Ratner, MSM, Israeli-American expert in HLS & cyber security, Six Gill discusses the evolution of cyber terrorism, and how the Internet has created a “global village,, where cyber terrorism could potentially be at anyone’s door.
With cyber terrorism in the news more and more, Peggy takes a look at how traditional terrorism has evolved, and forecasts where cybercrime will go during the coming months.
Gary Warner, director of research and computer forensics, The University of Alabama, Birmingham, explains why companies and individuals need to treat hacking like the crime that it is, and tell the authorities.
Chris Rouland, CEO, Bastille Networks, talks about measures companies should take to ensure cyber security.
Peggy Smedley talks about the rise of mobile banking and what that means for the tablet market.
Seth Danberry, president and cofounder, Grid 32 Information Security, explains how his company helps businesses by hacking them.
Victor Melfi Jr., chief strategy officer and senior vice president, Voicebox Technologies, discusses the potential of voice-controlled technology.
Peggy Smedley explains simple steps businesses can take to avoid issues with cyber security.
Peggy Smedley questions whether we have lost control of our cybersecurity and whether corporate America is taking the necessary steps to recognize today’s breed of sophisticated hackers?
Sandra Guy, reporter, Chicago Sun Times, discusses Chicago-based incubators and the changing nature of start-ups.
Scott Schober, president and CEO, Berkeley Varitronics Systems, discusses the deep and dark Web, and how sharing information after a hack can help combat them.
Peggy explains how personal devices threaten the cyber security of a business, and how private and corporate networks may not be as secure as they should.
Ian Drew, executive vice president of business development and CMO, ARM discusses data security in connected devices and ARM’s partnership with kickstarter.
Peggy Smedley discusses cyber threats, cloud-based services and the connected car.
Peggy Smedley answers listener questions involving smart-grid implementation, use of technology in the banking industry, and if businesses can be held negligent for cyber breaches.
Laurie Lamberth, associate partner, 151 Advisors, tells of what companies are doing to connect devices to the cloud, new platforms being used, and the connection between security and standards.
Peggy Smedley talks about an analyst’s recommendations to businesses in order to combat cyber crime, and, what’s in store for the connected car market during the next few years.
Peggy Smedley tells of how 3D printing has given a youngster a new arm, potential cyber issues during “Black Friday,” and what theater owners are worried about regarding wearables.
Kevin Hunter, COO, Gimbal, discusses the company’s history, importance of beacons, and importance of security.
Peggy Smedley discusses issues between several governmental agencies regarding encryption methods and the conflict it is causing between providing security for users and keeping law enforcement from gathering evidence.
Mark Brooks, senior research engineer, Southwest Research Institute, explains the importance of embedded security and what security issues does the automobile industry face.
Ben Feinstein, CTU director of operations and development, Dell SecureWorks, tells why security officials are concerned about the IoT and what Dell Secureworks is doing to combat problems.
Bryan Sartin, director RISK Team, Verizon Enterprise Solutions, explains what the RISK Team does and unveils a new solution which eliminates the necessity for usernames and passwords.
Peggy Smedley discusses data breaches at UPS and Community Health Systems, as well as how many U.S. organizations have encountered hacking troubles since the start of 2014.
Greg Smith, CEO, Koolspan, tells of the rapid growth of Koolspan, trends in the area of mobile security, and how recent hacking scandals have altered the mobile security business.
Laetitia Jay, vice president of M2M and marketing and services, Gemalto, explains the barriers between M2M and IoT adoption, what end users can do to secure smart devices, and where the future of M2M is headed.
Marc Maiffret, CTO, BeyondTrust, looks at changes in security threats over the years, how BeyondTrust can reduce security risks, and the relation between privilege and vulnerability management.
Peggy Smedley discusses how a company can move up on Google’s search rankings, the problems with waiting to inform others of a security breach, and the importance of creating a secure password.
Peggy Smedley discusses three new pieces of legislation designed to bolster cybersecurity efforts and looks at a major data breach which affected more than 1 billion records and a half a billion email addresses.
Lieutenant General James McLaughlin talks to Peggy Smedley about what businesses can do to educate customers on cyber threats and what he wants to accomplish as Deputy Commander of U.S. Cyber Command.
Lieutenant General James McLaughlin addresses the issue of consumer awareness regarding cyber threats and the need for basic cyber hygiene.
Peggy Smedley and Lieutenant General McLaughlin discuss protecting critical infrastructure from cyber attacks, public preparedness for cyber incidents, and how to get different entities to work together to combat this issue.
Lieutenant General James McLaughlin talks about the mission of the 24th Air Force, team work to accomplish the mission, and San Antonio’s becoming “Cyber City, USA.”
John Carbone, senior advisor and engineering fellow, Raytheon, talks about digital perimeters, the financial risks associated with security breaches, and who is doing the best in addressing cyber security.
Ed Scheidt, chief scientist and senior vice president, Tecsec, talks about Tecsec, the role encryption plays in securing information, and what businesses need to know about cybersecurity.
Bob Butler, CSO, IO, explains the changes in threats to government and business over the years and what some of the biggest cyber risks are today.
Peggy Smedley discusses the chaos cyber attacks can create on the nation’s infrastructure and businesses, as well as the importance of education in battling this threat.
Peggy Smedley looks ahead to next month’s topic which will center around cybersecurity, featuring a special interview with the new Deputy Commander of U.S. Cyber Command, Lieutenant General James McLaughlin.
Terry Kurzynski, founder and senior partner for HALOCK Security Labs tells Peggy about the risk of consumer's information and what HALOCK Security Labs is doing to prevent it.
Phil Pyo, director, product marketing for Netgear explains how they keep users satisfied with reliable networks, storage, and security for your business or home.
Lars Thyroff, head of automotive, M2M for Gemalto tells how the company is committed to being a world leader in digital security.
Jon Troutman, cofounder and design director for Canary talks to Peggy about how their video camera and safety sensor will track everything in your home while you are away.
Keith Brandon, director, residential access solutions for Kwikset talks to Peggy about how the locks on our door can become connected as well.
Aamir Virani, cofounder and COO (chief operating officer) of Dropcam, talks about what has made home monitoring and security such a success and gives insight as to what is next.