Episode 294 of The CyberJungle is about 30 minutes long. The interview with James Elste on privacy and Trusted Identities begins at about the 15min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.
To listen to Episode 294 via the flash player:
James Elste, information security expert, talks privacy and NIST’s Trusted Identities effort. Here are the links from the segment:
Tales From The Dark Web
Ira talked about the credit reporting agency break ins, and how Federal law made the attacks easier
Our Take On This Week’s News
How will you know who’s recording? Google Glass protestors set up campaign group to censor the high-tech eyewear
Ohio judge calls speed cameras ‘scam’
Please support our sponsors, as they support The CyberJungle
SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.
SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.
SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.