Home > Shows > Recent > 2006 Shows > 2006/07/22 October 2, 2014 User: Visitor

Home
Shows
   August 8, 2009
August 1, 2009
July 25, 2009
July 18, 2009
Recent
   2009 Shows
2008 Shows
2007 Shows
2006 Shows
   2006/01/08
2006/01/14
2006/01/21
2006/01/28
2006/02/04
2006/02/11
2006/02/25
2006/02/18
2006/03/04
2006/04/28
2006/05/06
2006/05/13
2006/5/20
2006/5/27
2006/06/03
2006/07/15
2006/07/22
2006/07/29
2006/08/05
2006/11/11
2006/11/18
2005 Shows
2004 Shows
News
Links
Feedback
The Host
Technology FAQ
Site Map
Rules & Policies

Be A Guest on Tech Talk

My Account


Show Synopsis

Today Craig will interview companies who are applying new technology to old problems to help reduce computer crime and increase computer security.

Today's Guests!

12:06-12:22 - Jim Phalen the sales manager of Netsquealer joins Craig to discuss this product and its importance in protecting businesses.

12:34-12:46 - Mike Yaeger from TechSecure Labs joins Craig to discuss perimeter-based managed security services for firewalls, VPNs, IDS' and IPS'. They will also discuss Internet based security testing and comprehensive risk assessments.

12:48-12:58 - Chris Fedde the SVP and General Manager of the Enterprise Security Division of SafeNet, Inc. joins Craig to discuss the reality of Laptop theft, daily identity breaches and overall weak security network systems.

1:06 - 1:22 - Ron Knode the Global Director of Security Solutions at Computer Sciences Corporation joins Craig to discuss how the real security problems of tomorrow will not be solved by the techniques of yesterday.

1:34 - 1:58 - Robert Richardson of the Computer Security Institute of CMP Communication joins Craig to discuss their 2006 Computer Crime and Security Survey and what it means to every business. The survey was of 5000 Computer Security Professionals (CTO, CIO and other IT professionals).

2:06-2:22 - Doug Graham from Business Edge Solutions will join Craig to discuss phone security with VOIP, how to identify phishing problems, how to lock down your computer or network, call spoofing, man in the middle attacks, and two factor authentication attacks.

2:24-2:46 - Sam Curry the VP of Security Management at Computer Associates joins Craig to discuss Wireless networks and ubiquitous access -- blackberries and other pda's, as well as other tried and true espionage that is raising its ugly head again.