Archive for February, 2013

February 25 2013, Episode 292, Show Notes

Posted in Exclusive, Show Notes, The CyberJungle with tags , , , , , on February 25, 2013 by datasecurityblog

Episode 292 of The CyberJungle is about 36 minutes long.  The interview with Alex Doll, CEO of OneID, on two factor authentication using elliptical curve cryptography begins at about the 21min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 292 via the flash player:

Interview

Alex Doll, CEO of OneID, on their approach to using two factor authentication with elliptical curve cryptography. The company says the primary purpose of OneID as a digital identity provider. Here’s their blog.

Tales From The Dark Web

Reuters – Analysis: The near impossible battle against hackers [sic] everywhere

Tales Our Take On This Week’s News

Google’s Android Reborn as Network-Hacking Kit

EdgeWave ‘Social Security

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Advertisements

February 11 2013, Episode 291, Show Notes

Posted in Conference Coverage, Exclusive, Show Notes, The CyberJungle with tags , , , on February 11, 2013 by datasecurityblog

Episode 291 of The CyberJungle is about 32 minutes long. We break with our normal format this week, with exclusive interviews on cloud security from the Paralells Summit in Las Vegas.  You can hear it by clicking on the flash player below. The interview with Brian Spector, CEO of Cetivox, on two factor authentication begins at about the 2:45min mark. The interview with CloudLinux CEO Igor Seletskiy, begins at about the 19min mark. The interview with Randal Skipper VP with SilverSky on legal issues with email archiving begins at about the 27min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 291 via the flash player:

Interviews

Brian Spector, CEO of Certivox, on a new development in 2FA. Here’s their blog.

CloudLinux CEO Igor Seletskiy, gives a new take to server linux. Link to their blog here.

Randal Skipper VP with SilverSky on legal issues and email archiving. Blog site here

Wrap

From Fox Business News: Forensics Analyst Ira Victor and Mashable’s Lance Ulanoff on the growing number of cyber-attacks on businesses and government

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.