Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting ... more
FAQs about Cyber Pro Files:How many episodes does Cyber Pro Files have?The podcast currently has 188 episodes available.
May 19, 2014SC 14: Flavors of IntelligenceWhat are intelligence security controls? Intelligence sharing domains? Shared response infrastructure? Are they just information security buzz words or do they have actionable meaning?securitycurrent's Vic Wheatman speaks with Gartner Research Director Lawrence Pingree about these concepts and their usefulness as part of an information security program. ...more6minPlay
May 19, 2014SC 14: Flavors of IntelligenceWhat are intelligence security controls? Intelligence sharing domains? Shared response infrastructure? Are they just information security buzz words or do they have actionable meaning?securitycurrent's Vic Wheatman speaks with Gartner Research Director Lawrence Pingree about these concepts and their usefulness as part of an information security program. ...more6minPlay
May 01, 2014SC 13: Voltage Spies Secure EmailFrom email to texting and other forms of social media, the need for protected communications underscores the requirement to continue encrypted messaging development. Despite legacy and current solutions on this matter, academic and private research continues in an effort to apply encryption to solving new business problems in numerous contexts. securitycurrent's Vic Wheatman speaks with Voltage's Chief Technology Officer Terrence Spies about the continuing evolution of secure messaging. ...more8minPlay
May 01, 2014SC 13: Voltage Spies Secure EmailFrom email to texting and other forms of social media, the need for protected communications underscores the requirement to continue encrypted messaging development. Despite legacy and current solutions on this matter, academic and private research continues in an effort to apply encryption to solving new business problems in numerous contexts. securitycurrent's Vic Wheatman speaks with Voltage's Chief Technology Officer Terrence Spies about the continuing evolution of secure messaging. ...more8minPlay
April 17, 2014SC 12: PCI DSS Version 3, What's New?Does the Payment Card Industry Data Security Standard (PCI DSS), now in its 3rd version, actually increase safeguards required to be taken by enterprises to ensure customer data?According to the PCI Security Standards Council, PCI DSS is a comprehensive standard "intended to help organizations proactively protect customer account data."But with the continuous news of breaches, is it successful? Is being compliant for an audit, essentially a snapshot in time, enough or has the latest version succeeded in bolstering security over the long haul?securitycurrent's Aimee Rhodes speaks with Gartner Research Vice President Anton Chuvakin, who has spoken with the Standards Council, on the changes in the latest version, how the standard has made real progress in fostering security and what to look forward to in the future with mobile processing....more11minPlay
April 17, 2014SC 12: PCI DSS Version 3, What's New?Does the Payment Card Industry Data Security Standard (PCI DSS), now in its 3rd version, actually increase safeguards required to be taken by enterprises to ensure customer data?According to the PCI Security Standards Council, PCI DSS is a comprehensive standard "intended to help organizations proactively protect customer account data."But with the continuous news of breaches, is it successful? Is being compliant for an audit, essentially a snapshot in time, enough or has the latest version succeeded in bolstering security over the long haul?securitycurrent's Aimee Rhodes speaks with Gartner Research Vice President Anton Chuvakin, who has spoken with the Standards Council, on the changes in the latest version, how the standard has made real progress in fostering security and what to look forward to in the future with mobile processing....more11minPlay
April 15, 2014SC 11: Tools for Securing the CloudWhat are use cases for security tools for protecting information in the cloud?What organizational changes can trigger an enterprise to adopt additional cloud-based protection?We are increasingly seeing a growth in cloud security providers offering tools to protect information and retain control of data.securitycurrent's Vic Wheatman speaks with CipherCloud's Chief Trust Officer Bob West about what we can expect to see in the growing field of cloud security....more6minPlay
April 15, 2014SC 11: Tools for Securing the CloudWhat are use cases for security tools for protecting information in the cloud?What organizational changes can trigger an enterprise to adopt additional cloud-based protection?We are increasingly seeing a growth in cloud security providers offering tools to protect information and retain control of data.securitycurrent's Vic Wheatman speaks with CipherCloud's Chief Trust Officer Bob West about what we can expect to see in the growing field of cloud security....more6minPlay
April 10, 2014SC 10: IT Security Entrepreneurs Forum 2014; Bridging the Gap Between the Federal Government and Private IndustryThe Security Innovation Network (SINET) this week held its annual IT Security Entrepreneurs Forum in Silicon Valley. There, connections were made among early stage security companies, investors, lawyers, regulators, educators and others.securitycurrent's Vic Wheatman spoke with SINET Chairman and Founder Robert Rodriguez who talks about the goals of the conference and gives its flavor also looks at the role emerging companies take in combatting proliferating security threats....more6minPlay
April 10, 2014SC 10: IT Security Entrepreneurs Forum 2014; Bridging the Gap Between the Federal Government and Private IndustryThe Security Innovation Network (SINET) this week held its annual IT Security Entrepreneurs Forum in Silicon Valley. There, connections were made among early stage security companies, investors, lawyers, regulators, educators and others.securitycurrent's Vic Wheatman spoke with SINET Chairman and Founder Robert Rodriguez who talks about the goals of the conference and gives its flavor also looks at the role emerging companies take in combatting proliferating security threats....more6minPlay
FAQs about Cyber Pro Files:How many episodes does Cyber Pro Files have?The podcast currently has 188 episodes available.