Security, Mobile & Cloud - Caleb Barlow-logo

Security, Mobile & Cloud - Caleb Barlow

BlogTalkRadio

Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives as well as security and service management professionals. This podcast is a proud member of the techpodcast.com network.

Location:

Boston, MA

Networks:

BlogTalkRadio

Description:

Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives as well as security and service management professionals. This podcast is a proud member of the techpodcast.com network.

Twitter:

@calebbarlow

Language:

English


Episodes
Ask host to enable sharing for playback control

Innovation Talks: Voices of IBM Security

2/29/2016
Today, IBM made a series of announcements, including the planned acquisition of Resilient Systems, Inc., that will aim to provide organizations with a proactive, comprehensive approach to respond to cyber breaches more quickly and effectively across consulting, services and products. With Resilient Systems, a leader in incident response, IBM will be in a position to provide the industry’s first integrated end-to-end Security Operations and Response Platform offering that spans the entire...

Duration:00:10:08

Ask host to enable sharing for playback control

Beware: Malware Crossing! Organized Cybercrime Comes to Town

2/4/2016
One of the most dominant trends observed in the cybercrime during 2015 was the spread of organized crime groups to new territories. Using banking Trojans to attack banks in new geographies is a significant step because it is considered to be part of the malware’s evolution. Before they can venture into countries they never targeted before, crime groups have to invest in an adequate preparatory stage that includes reconnaissance of the banking systems in that geography. They also have to...

Duration:00:17:28

Ask host to enable sharing for playback control

Data at Risk - Is there a weakness in self-encrypting hard drives?

1/5/2016
Self-encrypting hard drives (SEDs) have been dubbed the security industry’s best-kept secret, but is the data inside really secure? With its ability to accelerate the drive-redeployment process, SEDs have been rising in popularity. Tune into this podcast to hear Rick Robinson, IBM Security Product Manager of Data Security, examine the security behind self-encrypting hard drives and some new-found security vulnerabilities that have recently been disclosed with SEDs.

Duration:00:30:47

Ask host to enable sharing for playback control

Containerization in a DevOps World: Can AppSec Keep Pace?

12/1/2015
Containerization (like Docker and IBM Containers) takes application portability to a new level. Applications can be packaged with everything they need to run for simplified, high-velocity deployment. By using native separation within the OS (Linux or Windows) organizations get many of the benefits of a VM without the overhead of a hypervisor. So what's the downside? Most security tools weren't designed to "play well" with containers. And many security teams aren't aware of the emerging...

Duration:00:22:40

Ask host to enable sharing for playback control

IoT Security: Reality or Thriller Plot Threats?

11/16/2015
When researchers discover vulnerabilities in Internet of Things (IoT) devices, the media hypes the consequences as if the movie "Maximum Overdrive" has jumped off the big screen and into reality. Will your connected car refuse to respond to your stabs at the brake pedal? Will soda machines start shooting cans at unsuspecting passers by? When will our robot vacuums rebel, controlled by Skynet? Join Caleb Barlow and Chris Poulin, Research Strategist for IBM's X-Force Security Threat...

Duration:00:30:42

Ask host to enable sharing for playback control

Tips to Protect Your Mobile Environment

10/2/2015
Organizations are constantly faced with evolving mobile technologies as well as finding new ways to secure them. The challenge is determining which mobile security strategy best fits your company's needs now and in the future. In this session, you will discover the key considerations for deploying a mobile security strategy based on your security and business requirements.

Duration:00:28:14

Ask host to enable sharing for playback control

Defense in Ranks: A Collective Approach to Cyber Security

10/1/2015
Today every organization faces its cyber security challenges, but to better balance the scales we need to extend access to cyber security and streamline how security practitioners can collaborate on everything from security best practices to advanced threat information and from security incident detection to incident response.

Duration:00:25:29

Ask host to enable sharing for playback control

Democratizing Security

9/16/2015
The innovation in the mobile banking space is moving at a blistering pace. End users require more convenience and flexibility. They want information at their fingertips. They want speed. They want accuracy. And they want…security. And balancing user experience and cyber crime prevention can be challenging. This podcast featuring Danny Piangerelli, CTO and co-founder Malauzai Software an Austin, TX based mobile and Internet banking company will share insights into the latest mobile banking...

Duration:00:22:28

Ask host to enable sharing for playback control

Mobile Security Is A Love-Hate Relationship

2/16/2015
Caleb Barlow, dives further into the recent findings made by IBM Security -- 60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world. Additional perspectives provided by Diana Kelley and Michael Montecillo. Read the full report at http://securityintelligence.com/datingapps/

Duration:00:22:55

Ask host to enable sharing for playback control

Proactive APT and Root Abuse Mitigation Techniques

9/12/2013
With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming from the internal privileged user - not always the actual user, but often an external party that compromised a privileged user with Advance...

Duration:00:35:41

Ask host to enable sharing for playback control

IBM announces intent to acquire Trusteer

8/15/2013
August 15, 2013 – Today IBM announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. Join Caleb Barlow, Marc Van Zadelhoff and Yishay Yovel moments after the announcement to discuss the Trusteer solution, the formation of a new IBM cybersecurity lab in Israel and the capabilities that Trusteer will brings to the table to combat fraud and malware thru “trusted transactions” for...

Duration:00:32:17

Ask host to enable sharing for playback control

DDoS - Best Practices for Now and Tomorrow

7/26/2013
Denial of Service (DDoS) attacks have been around awhile. Mafia Boy, a high school student, allegedly made history by attacking big name companies like Yahoo and a week later Ebay, CNN, Amazon and Dell back in the cyber-crime dark ages in the year of 2000. Over time, new motivations such as hacktivism have made DDoS the weapon of choice as it so effective in getting publicity. It is also a very versatile tool as there are a plethora of techniques to exhaust resources, Denial of Service can...

Duration:00:27:01

Ask host to enable sharing for playback control

2013 Gartner Magic Quadrant for Application Security Testing

7/25/2013
In this podcast we review the newly published Gartner Magic Quadrant for Application Security Testing (AST) with our subject matter expert Diana R. Kelley (Application Security Strategist, IBM Security Systems). The live discussion will cover the value for customer using this new combined SAST and DAST MQ report, how and when security as a service can be used in your enterprise, insights on IBM's support for iOS application testing as well as what's next within the application security...

Duration:00:38:17

Ask host to enable sharing for playback control

Black Hat Security Preview

7/10/2013
Are you going to the Black Hat Security Conference starting on July 27th in Vegas? Here's a preview of what our team will be doing and the sessions that can help you build your schedule. In this podcast Caleb gives each of the IBM speakers a chance to give a quick commercial of their session so listen to this in the car or on the airplane on the way to Black Hat and you can map out your week. Also check out our new blog at http://securityintelligence.com/

Duration:00:20:06