Podcasts about EWeek

  • 36PODCASTS
  • 48EPISODES
  • 38mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 23, 2024LATEST
EWeek

POPULARITY

20172018201920202021202220232024


Best podcasts about EWeek

Latest podcast episodes about EWeek

FUELED | A Fenstermaker Podcast
S4 Ep5 EWeek 24: Andy Sellers, P.E., hosted by Rhett Hebert, E.I.

FUELED | A Fenstermaker Podcast

Play Episode Listen Later Feb 23, 2024 22:25


Andy Sellers joined Fenstermaker's Lafayette Engineering group in December 2006 and gained professional engineering licensure over a decade ago in 2013. Andy specializes in civil projects for municipal and parish clients.  Currently serving as the Engineer for the City of Carencro, Mr. Sellers manages client relations, engineering services, and infrastructure projects. His responsibilities span the design and enhancement of drainage systems, floodplain management, roadway design, utility design, site design, construction administration, and plan review for commercial and residential developments. In his capacity as a Certified Floodplain Manager, Andy collaborates closely with the City of Carencro's planning department to oversee and administer floodplains within the city limits. He plays a pivotal role in the annual recertification of the City's participation in the National Flood Insurance Program's Community Rating System, actively contributing to secure funding for flood mitigation projects through various grant programs, and serving as agency coordinator for these initiatives. 

FUELED | A Fenstermaker Podcast
S4 Ep4 EWeek 24: Dustin Guidry, P.E., hosted by Marina Saad, E.I.

FUELED | A Fenstermaker Podcast

Play Episode Listen Later Feb 21, 2024 28:27


Dustin Guidry is a licensed professional engineer in Louisiana with extensive expertise in civil engineering and construction management. Dustin began his career with Fenstermaker in December 2012 as a construction inspector. In this role, Dustin collaborated closely with contractors and engineers in the field, ensuring projects adhered to plans and specifications. Evolving within the company, Dustin transitioned into the role of a CADD Technician, where he collaborated with engineers and surveyors to generate construction plans, survey plats, and project exhibits. With a solid foundation in Civil Engineering, he furthered his career as a project engineer, shouldering responsibilities for Construction Administration. 

FUELED | A Fenstermaker Podcast
S4 Ep2 EWeek 24: Anna Doucet, P.E., hosted by Braden Dauphine

FUELED | A Fenstermaker Podcast

Play Episode Listen Later Feb 20, 2024 21:15


Anna Doucet began her career at Fenstermaker early in 2015. Subsequently gaining her licensure 4 years later in 2019, Anna is now a Professional Engineer specializing in roadway design, hydrologic and hydraulic modeling, and project management within water resource and transportation sectors.  In her current role, Anna oversees civil design projects, strategically managing multi-million-dollar projects for both public and private sectors. She has collaborated with various agencies, including LADOTD, FEMA, GOHSEP, along with local municipalities, showcasing her coordination skills in diverse project environments. Anna has successfully brought many water resources projects to completion, incorporating numerical hydrologic and hydraulic modeling for floodplain mapping, FEMA No-Rise, and FEMA LOMR. Her utilization of numerical modeling extends to assessing future conditions of drainage basins and formulating cost-effective projects that enhance individual watersheds. 

FUELED | A Fenstermaker Podcast
S4 Ep3 EWeek 24: Nick Castille, P.E., hosted by Holden Landry

FUELED | A Fenstermaker Podcast

Play Episode Listen Later Feb 20, 2024 25:37


Nicholas Castille joined Fenstermaker in November 2019 after graduating from the University of Louisiana at Lafayette. He then gained his professional engineering licensure three-and-a-half years later in 2023. As a civil engineer, Nick brings his expertise in design, planning, and hydraulic modeling to our Engineering division. Nick actively contributes to roadway plan preparation, horizontal geometric design, inspections, design of geotechnical features, and the implementation of open and closed drainage systems. His primary focus and expertise lie in Drainage DesignHydrologic and Hydraulic Modeling & ReportingRoadway Design and Plan ProductionCivil Site DesignConstruction Administration

FUELED | A Fenstermaker Podcast
S4 Ep1 EWeek 24: Ian Trahan, P.E., hosted by Mason Macaluso, E.I.

FUELED | A Fenstermaker Podcast

Play Episode Listen Later Feb 19, 2024 24:24


Ian Trahan, P.E. is a Senior Engineer, he joined Fenstermaker in April 2021. Ian obtained his professional licensure first in Illinois in 2002, and then 2 years later became licensed in Louisiana, almost 20 years ago now.   In his prior role, Ian served the Louisiana Department of Transportation and Development (DOTD) as Program Manager for their involvement in the Louisiana Watershed Initiative (LWI).   There, Mr. Trahan oversaw the DOTD/LWI Statewide Modeling Program, managing four out of seven modeling teams across the State of Louisiana. His active participation in various LWI Technical Advisory Groups, representation of DOTD on the LWI Working Group, and involvement in the LWI Technical Design and Quality (TDQ) Team underscore his dedication to advancing the engineering field.  Ian's Areas of Expertise include: Project Management Roadway Design 3D Roadway Modeling Residential and Commercial Development Costing for USACE Construction Management Stormwater Management and Planning Hydraulic and Hydrologic Design and Analysis Mentoring Young Professionals. 

The Look Back with Host Keith Newman

David Strom is my go-to guy for all things Networking and Security -- the two hottest topics for the last 20 years. He's also an alumni friend who ran Network Computing, eWeek and has contributed or led many other tech-oriented media products. Strom was coerced to join me for a chat on The Look Back and in return I feel obliged to mention his must-read bylines on @SiliconAngle -->  one of the sharpest perspectives on internet and security issues. 

security networking strom eweek david strom
The Look Back with Host Keith Newman

Tony Uphoff has media instincts in his DNA -- as a child born into a media active family, Tony was destined to a world of publishing -- but at the helm of eWeek and InformationWeek and many other well known brands, and is not lending his experience and energy to Media/Research disruptor, @Acceleration Economy. Tony also led the turnaround and successful sale of Thomasnet.com to Xometry for $300M - just a blast to catch up with an alumni brother and someone I've always learned from and admired. 

3:12 - The HRP Podcast
Engineers Week 2023

3:12 - The HRP Podcast

Play Episode Listen Later Feb 22, 2023 43:48


Happy #EWeek! Founded in 1951, Engineers Week was created to ensure a diverse and well-educated future engineering workforce by increasing understanding of and interest in engineering and technology careers. So, what exactly do our engineers do at HRP? We talked with several of HRP's top engineers about Wastewater, Civil, Environmental, and Compliance Engineering. Don't forget to checkout or social media to see our engineers take the challenge! For the Play Hard segment host Tom Simmons joins HRP's Engineering Practice Leader Tom Battles at HRP's Derby office for an interbuilding field trip to BAD SONS Brewing.A reminder that our Play Hard segment is also available in video form! Watch that on our YouTube Channel.Make sure you subscribe, give us a review & check us out on social media!YouTubeLinkedInInstagramTwitterFacebookWebsite

Tech & Main Presents
Security and Resilience | Kris Lovejoy

Tech & Main Presents

Play Episode Listen Later Feb 6, 2023 18:27


Kris Lovejoy is the global security and resilience practice leader at Kyndryll. She made stellar contributions as a global cybersecurity leader at Ernst and Young and was the chief executive officer at BlueVector, Maryland. She was also the founder and CEO of BlueVector Inc, which worked with the Al-powered sense and response platform. Kris was the president at Acuity Solutions and served at IBM, starting as the VP of security strategy for three years, followed by the VP for iT risk/ CISO, and then the GM for OBM security services division for over four years. As a leader in cybersecurity, she extended her knowledge of consul risk management as the CTO, CIO, and VP of support and services. Prior to that, Kris worked as the VP of security assurance services at TruSecure for five years. Kris has expertise in security, risk, compliance, and governance and was featured in the top 25 CTO in the InfoWorld list. Moreover, she was among the top 25 most influential security executives by the Security magazine and was among the top woman in security by eWeek. Kris has the United States and European Union's patent for object-oriented risk management models and methods. She was named the top woman technology leader by Consulting magazine in 2020. To learn more go to http://linkedin.com/in/klovejoy. --- Send in a voice message: https://anchor.fm/techandmain/message

Look Left @ Marketing
Wayne Rash on the Advance of Technology and Decline of Tech Journalism

Look Left @ Marketing

Play Episode Listen Later Dec 13, 2022 26:36


Over the past 45 years, Wayne Rash has covered every inch of the tech space. Among his many notable posts, Wayne was executive editor at eWEEK, eWEEK.com, and Ziff Davis Events. He was a senior contributing editor and a senior analyst in the InfoWorld Test Center. Additionally, Wayne worked as a reviewer for Federal Computer Week and Information Security Magazine. He also ran the reviews and events departments at CMP's InternetWeek and was a long-time columnist for Byte Magazine. Today, Wayne is based in Washington, DC, and contributes to Forbes, U.S. News & World Report, CNN_Underscored, and Red Ventures. In addition to his work as a reporter, editor, and reviewer, Wayne has authored five books, including Politics on the Nets: Wiring the Political Process, a 1997 work examining the emerging role of the internet in politics. Wayne also pioneered the use of big data analysis in his reporting. As part of his coverage of the 2016 presidential primary season, he was able to show a likely win for Donald Trump. Wayne is a retired naval officer and a former news director for a number of radio and television stations in Virginia.  In this episode of the Look Left @ Marketing podcast, Davida Dinerman gets Wayne Rash's insights on a wide variety of topics. Here are a few of the highlights: 01:51 - 20 years of service in the U.S. Navy03:31 - Technology advances through the years04:45 - Early online communities that foreshadowed social media05:48 - Tech that had promise but went bust06:53 - The current state of tech journalism09:52 – How content properly generated by companies can be helpful and influential11:45 - How to break into the news business13:29 - The best way to grab the attention of a tech journalist16:59 - Predictions for what's ahead in technology20:29 - The problem with building security into products22:18 - The bleak outlook for tech journalism

The Embargoed
The Embargoed - Episode 49 - eWeek's James Maguire, AWS and Stolen Luggage

The Embargoed

Play Episode Listen Later Nov 29, 2022 42:13


AWS re:Invent is happening this week in Las Vegas, and we have a fascinating piece of history courtesy of our guest​​ eWeek's James Maguire who shares an early video of an AWS rep from 2007/2008. Also, catch a quick clip of your co-host's car being broken into in Oakland. There's a lesson here for you. 

CISO-Security Vendor Relationship Podcast
What's Next in Cybersecurity? Look at Last Year and Expect More

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Mar 29, 2022 33:18


All links and images for this episode can be found on CISO Series The web is awash with sites claiming they know what the security trends will be for 2022. All of them were filled with quotes from security experts at different vendors who "surprise" we're saying the big trend is what their product can fix. One publication, eWEEK, had probably the only logical set of trends and they look a lot like what happened in 2021. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Ori Arbel, CTO, CYREBRO. Thanks to our podcast sponsor, CYREBRO Ninety percent of post mortems show that the high cost of damage from a cyberattack was avoidable, but no one knew in time to stop it. CYREBRO's SOC Platform is your cybersecurity central command, integrating all your security events with 24/7 strategic monitoring, proactive threat intelligence, and rapid incident response. More from CYREBRO. In this episode: How should you be handling your security operations center (SOC)? Tips for improving your incident response planning. What are the cloud security trends of 2022?

The Holtz Story
Ransomware with Corey Nachreiner of WatchGuard

The Holtz Story

Play Episode Listen Later Oct 29, 2021 42:05


This week, Corey Nachreiner, Chief Security Officer at WatchGuard, joins The Holtz Story to discuss data's role in ransomware. Corey is an authority on network security and an internationally quoted commentator. He is a regular contributor to leading publications including CNET, Dark Reading, eWeek, Help Net Security, Information Week, and Infosecurity, and delivers WatchGuard's "Daily Security Byte" video on Facebook.This episode opens with a discussion of ransomware and how it has evolved over time. Corey calls the early years of ransomware the shotgun period, where everyone was targeted and ransoms were small. Now, cybercriminals are taking more time to select their targets and are seeking bigger paydays. The conversation then shifts to budgets and strategic approaches of SMBs. Corey points out that we can achieve a lot in cybersecurity by implementing best practices with traditional tools, as well as the need to focus not only on blocking attacks but on the detection and remediation of threats. Tracy brings the conversation back to a broader security framework and Zero Trust. Corey points out Zero Trust is an evolution of the least privilege principle which has been around for a long time. It starts with identity, making sure we can validate the person is who they say they are, and then only letting the user do what they are permitted to do. This podcast ends with a discussion about why SMBs need MSSPs, and how MSPs are adapting to this need. Corey shares how we went from VARs to MSPs to MSSPs, and how blurred the role of the MSP has become in cybersecurity. This also includes a brief discussion on how M&A is shaping some of this change. We hope you enjoy the show. If you do, please share it with colleagues and remember to subscribe using your favorite podcast platform (I.e., iTunes, Stitcher, Spotify, Google Play, etc.).

Cyber Security Weekly Podcast
Episode 280 - Celebrating 25yrs with WatchGuard & APAC Threat Landscape

Cyber Security Weekly Podcast

Play Episode Listen Later Aug 25, 2021


WatchGuard is celebrating 25 years in 2021! Today, we speak with WatchGuard's Corey Nachreiner, Chief Security Officer based in Seattle, USA and Vincent Tan, Regional Sales Director in Singapore for Southeast Asia. Nachreiner is an authority on network security and has operated at the frontline of cyber security for 22 years, and for nearly a decade has been evaluating and making accurate predictions about information security trends. We'll also discuss the recent Kaseya ransomware attack and other 'Big Game' attacks amongst other industry and sector trends in the region and globally. Recognized as a thought leader in IT security, Nachreiner spearheads WatchGuard's technology vision and direction, and manages WatchGuard's corporate security. Previously, he was the director of strategy and research at WatchGuard. Nachreiner has operated at the frontline of cyber security for 22 years, and for nearly a decade has been evaluating and making accurate predictions about information security trends. As an authority on network security and internationally quoted commentator, Nachreiner's expertise and ability to dissect complex security topics make him a sought-after speaker at forums such as Gartner, Infosec and RSA. He is also a regular contributor to leading publications including CNET, Dark Reading, eWeek, Help Net Security, Information Week and Infosecurity, and co-host The 443 Security Simplified podcast. #mysecuritytv #watchguard #threatlandscape #cybersecurity Recorded and streamed live on MySec.TV - Friday 20 August 2021 - to watch the session visit https://mysecuritymarketplace.com/av-media/celebrating-25yrs-with-watchguard-apac-threat-landscape/

Engineering Influence from ACEC
Eweek 2021: Scholarship Spotlight

Engineering Influence from ACEC

Play Episode Listen Later Feb 24, 2021 30:49


Engineering Influence continues to celebrate Engineers Week 2021. We were happy to invite three recent ACEC Scholarship winners to share their experiences as young engineers who are completing their educations or just starting out in the workforce.  Our panel discussion welcomed: Alisha Stidam, who was awarded the $10,000 Jim Kleinfelder ACEC Scholarship, works for OHM Advisors. Matthew Schomacker, who received the $5,000 Lennox Nishimura Scholarship, is working toward a bachelor's/master’s degree in civil engineering from Northeastern University. Teresa Magana who received the $5,000 Professional Liability Agents Network (PLAN) Scholarship and is studying for a master's degree in geotechnical engineering at California State University, Sacramento.  

Algolia Podcast
32. AlgoliaのState of Search and Discoveryレポートからみる8つのポイント

Algolia Podcast

Play Episode Listen Later Jan 21, 2021 23:08


タイムライン 00:10 LACOSTEのAlgolia事例 の紹介 03:55 2月4日にオンライン開催されるAlgolia Community Party の紹介 06:15 NRF2021に、Algolia CEO Bernadetteが登壇します 07:25 LaraconEUにAlgoliaのエンジニアJulien Bourdeauが登壇しました - Building multi-domain multi-tenant SaaS app with JetStream ソースコードはGitHub上で公開されています 13:15 eWeek.comのWhy Site Search Can Make or Break a Business State of Search and Discoveryレポート 20:20 Vue.js BerlinでのTim Benniksさんの講演Magical combination to build a modern websiteの紹介 21:46 Achieving a virtuous tech strategy in the online library space, according to Perlego CTOに書かれているAlgolia導入事例の紹介 関連リンク Lacoste achieves +150% sales contribution from search Algolia Community Party - Online edition Mr. Boston Bartender's Guide NUXT JS Applying the Headless Commerce approach to AI to optimize every step of the customer journey produced by Algolia Building multi-domain multi-tenant SaaS app with JetStream State of Search and Discovery Why Site Search Can Make or Break a Business Magical combination to build a modern website Perlego

NZ Tech Podcast
Michael Howard - Cyber Security Innovator

NZ Tech Podcast

Play Episode Listen Later Aug 19, 2020 55:42


US based New Zealander Michael Howard has had a massive impact in reducing Cyber Security risk globally and currently advises on security in relation to Microsoft's Azure cloud computing services.On this NZ Tech Podcast episode we hear career insights and advice from Michael - including how he came to convince Microsoft Founder Bill Gates of the importance of writing secure code - which lead to Gates famous company-wide memo on Trustworthy computing in January 2002. This changed the course of how Microsoft developed software and over time is considered to have had a profound impact in how software is written around the world.Michael, a Senior Principal Cybersecurity Architect, started at Microsoft in Auckland in 1992, and has worked in the field of software security for over twenty years. He is a founder and architect of the Microsoft Security Development Lifecycle (SDL).eWeek magazine selected Howard as one of “The 100 Most Influential People in IT”, one of “The 25 Most Influential People at Microsoft” and one of “The 15 Most Influential People in Security.”Michael was the application security lead for the Rio 2016 Olympic Games in Brazil and worked on state election systems during the 2016 U.S. Presidential Election. Michael is the author of many software security-related books over a period of nearly 20-years and co-hosts the Azure Security Podcast. NZ Tech PodcastPaul SpainGorilla TechnologyFree Tesla SuperchargingSpecial thanks to organisations who support innovation and tech leadership in New Zealand by partnering with NZ Tech Podcast:Umbrellar ConnectSumo LogicVodafone NZHPSamsungSpark NZVocus

Look Left @ Marketing
eWEEK’s Chris Preimesberger Covers Business IT from All Angles

Look Left @ Marketing

Play Episode Play 17 sec Highlight Listen Later Jun 9, 2020 19:12


Chris Preimesberger has been covering and analyzing IT business and innovation since 1995. Currently, he is editor-in-chief at eWEEK - for over two decades, one of the leading outlets for information technology news, reviews and features.In addition to his chores running eWEEK, Chris is also busy these days with the #eWEEKchat on Twitter (which you can easily join via Crowd Chat) and in the process of producing the eSPEAKS video-interview series and a new podcast. Here are some of the conversation highlights:01:26 - Reporters today must be a “jack-of-all-trades”02:55 - eWEEK’s evolution06:20 - New developments at eWEEK08:17 - Translating complex technologies into compelling business stories 10:00 - Executives need to be able to explain the business value of their technology13:15 - COVID-19’s impact on collaborative technologies15:20 - Conferences will never be the same, but they will be back15:40 - The business executives that Chris enjoys interviewing16:23 - Working well with PR professionalsOver the past 25 years, Chris has been on top of all the major shifts in business IT. With the new ownership at eWEEK bringing new energy to the outlet, we look forward to following the work of Chris and his team in the years ahead. Our thanks to Chris Preimesberger for joining us on the Look Left @ Marketing podcast.

The Minds of Madness - True Crime Stories
Episode 76 - Nina Reiser

The Minds of Madness - True Crime Stories

Play Episode Listen Later May 10, 2020 39:00


On Sunday September 3rd, 2006 Nina Reiser dropped her kids off with their father Hans in Oakland California so they could spend time with him over the Labour Day weekend. But when she missed a couple of dinner dates and failed to pick up her children from school on Tuesday, friends alerted police she was missing. Music Credits:The Minds Of Madness Theme Music – Duncan FosterThe Funkoars – Feel The MadnessUsed with Permission - http://goldenerarecords.com.au/ge/funkoarsPlease check out this episodes sponsors and help support our podcast:Sakara - Get 20% off your first order today using code MADNESS at checkouthttps://www.sakara.com/pages/madness?utm_medium=madness&utm_source=podcastSimpliSafe - Get FREE shipping and a 60-day risk free trialhttps://simplisafe.com/madnessBest Fiends - Download Best Fiends FREE on the Apple App Store or Google PlayMadison Reed: Get 10% off plus FREE SHIPPING on your first Color Kit go to madison-reed.com and enter PROMO CODE: MINDSResearch & Writing:Christine Penhale https://thetruecrimefiles.com/ Special Thanks:Peter & Traci @ PODHIVEhttps://www.podhive.com/If you would like to support the show and get some extra perks including extra content, including early release/ad-free episodes, Go to - https://www.patreon.com/MadnessPodWebsite - https://mindsofmadnesspodcast.com/Facebook - https://www.facebook.com/themindsofmadness/Twitter - @MadnessPod https://twitter.com/MadnessPodInstagram - https://www.instagram.com/themindsofmadness/Sources:“Reiser5 File-System In Development - Adds Local Volumes With Parallel Scaling Out.” Phoronix, December 31, 2019.https://www.phoronix.com/scan.php?page=news_item&px=Reiser5-Development“Hans Reiser.” Computer Hope, November 16, 2019.https://www.computerhope.com/people/hans_reiser.htm“Tweets About Hans Reiser.” Twitter, August 2019.https://twitter.com/vaurorapub/status/1166512356706283523“Computer Programmer Who Strangled Russian Wife and Buried Her in Shallow Grave is Ordered to Pay Their 'Damaged' Children $60m Compensation.” Daily Mail, July 19, 2012.https://www.dailymail.co.uk/news/article-2175836/Hans-Reiser-strangled-Russian-wife-buried-shallow-grave-pay-children-60m-compensation.html“Hans Reiser Loses Civil Suit in His Wife’s Death.” The Charley Project, July 19, 2012.https://charleyross.wordpress.com/tag/hans-reiser/“Hans Reiser Must Pay Kids $60 Million.” SF Gate, July 17, 2012.https://www.sfgate.com/crime/article/Hans-Reiser-must-pay-kids-60-million-3713670.php“Jury Awards Hans Reiser’s Children $60 Million in Damages.” The Mercury News, July 17, 2012.https://www.mercurynews.com/2012/07/17/jury-awards-hans-reisers-children-60-million-in-damages/“Wife Killer, Programmer Hans Reiser Must Pay Kids $60M.” CNET, July 17, 2012.https://www.cnet.com/news/wife-killer-programmer-hans-reiser-must-pay-kids-60m/“Wrongful-Death Lawsuit Against Hans Reiser in Jury’s Hands.” East Bay Times, July 16, 2012.https://www.eastbaytimes.com/2012/07/16/wrongful-death-lawsuit-against-hans-reiser-in-jurys-hands/“Hans Reiser Testifies Wife Was 'Psychopath'.” ABC 13, July 13, 2012.https://abc13.com/archive/8736206/“Convicted Killer Reiser Admits Wife Never Directly Harmed Children.” CBC SF Bay Area, July 12, 2012.https://sanfrancisco.cbslocal.com/2012/07/12/convicted-killer-reiser-admits-wife-never-directly-harmed-children/“Hans Reiser Takes Stand for Hours.” NBC Bay Area News, July 12, 2012.https://www.nbcbayarea.com/news/local/hans-reiser-defends-himself/2095757/“Reiser Wrongful Death Trial Begins Today.” ABC 7 News, July 11, 2012.https://abc7chicago.com/archive/8732427/“Reiser Asks Potential Jurors About Morality of Murder.” ABC 7 News, July 10, 2012.https://abc7news.com/archive/8731301/“Convicted of Murder, Linux Guru Hans Reiser Returns to Court to Fight Civil Suit.” Wired, July 6, 2012.https://www.wired.com/2012/07/linux-guru-returns-to-court/“Programmed for Murder.” Dominick Dunne’s Power, Privilege, and Justice, August 28, 2009.https://www.youtube.com/watch?v=A2Spetgu3tY“San Quentin Prisoner Beaten.” KCBS, January 10, 2009.https://web.archive.org/web/20090609172728/http://www.kcbs.com/pages/3634907.php“Extra: A Stunning Twist.” CBS News, December 30, 2008.https://www.cbsnews.com/video/extra-a-stunning-twist/“Reiser Confesses to Strangling Estranged Wife.” SF Gate, August 30, 2008.https://www.sfgate.com/bayarea/article/Reiser-confesses-to-strangling-estranged-wife-3197731.php“Hans Reiser Sentenced: 15 Years to Life.” Wired, August 29, 2008.https://www.youtube.com/watch?v=iRn221y-e8g“My Interview With Murderer Hans Reiser.” Salon, July 9, 2008.https://www.salon.com/2008/07/09/hans_reiser/“Hans Reiser Confesses, Leads Police to Murdered Wife's Body.” Linux Journal, July 8, 2008.https://www.linuxjournal.com/content/hans-reiser-confesses-leads-police-murdered-wifes-body“Reiser's Desperate Bid for a Reduced Sentence.” The Register, July 8, 2008.https://www.theregister.co.uk/2008/07/08/body_found_reiser/“Wife-Slaying Linux Guru May Have 'Developmental Disability'.” The Register, July 3, 2008.https://www.theregister.co.uk/2008/07/03/reiser_mentally_incompetent_claim/“Extra: Hans Reiser's Phone Call.” CBS News, June 3, 2008.https://www.cbsnews.com/video/extra-hans-reisers-phone-call/“'Geek Defense' Crash-and-Burn: Reiser Found Guilty.” Linux Journal, April 29, 2008.https://www.linuxjournal.com/content/geek-defense-crash-and-burn-reiser-found-guilty“Verdict in Hans Reiser Murder Case -- and Fate of Reiser4 – Imminent.” ZDNet, April 28, 2008.https://www.zdnet.com/article/verdict-in-hans-reiser-murder-case-and-fate-of-reiser4-imminent/“Hans Reiser: A Creep But Not a Murderer?” Tech Liberation, April 19, 2008.https://techliberation.com/2008/04/19/hans-reiser-a-creep-but-not-a-murderer/“Transcript: 20/20's Interview With Hans Reiser.” ABC News, March 4, 2008.https://abcnews.go.com/2020/story?id=4387343&page=1“Reiser Trial Borders on the Bizarre.” Fog City Journal, February 22, 2008.http://www.fogcityjournal.com/news_in_brief/bcn_hans_reiser_080222.shtml“Berkeley Alumnus Hans Reiser On Trial for Wife's Murder.” The Daily Californian, February 14, 2008.https://archive.dailycal.org/article.php?id=100390“Nina Reiser's Mother, Defense Attorney Verbally Sparring at Hans Reiser Murder Trial.” Wired, February 14, 2008.https://www.wired.com/2008/02/nina-reisers-3/“Hans Reiser Trial: Jan. 31, 2008.” SF Gate, January 31, 2008.https://blog.sfgate.com/localnews/2008/01/31/hans-reiser-trial-jan-31-2008/“Surprise Video Shows Reiser at Berkeley Bowl on Day She Disappeared.” SF Gate, January 16, 2008.https://www.sfgate.com/bayarea/article/Surprise-video-shows-Reiser-at-Berkeley-Bowl-on-3232240.php“Contents of Nina Reiser's Van Detailed in Murder Trial Testimony.” SF Gate, January 18, 2008.https://www.sfgate.com/bayarea/article/Contents-of-Nina-Reiser-s-van-detailed-in-murder-3230560.php“Betrayal.” 48 Hours, January 3, 2008.https://www.cbsnews.com/news/betrayal-29-12-2008/“Reiser Boyfriend Says Mom Wouldn’t Abandon Her Kids.” East Bay Times, December 6, 2007.https://www.eastbaytimes.com/2007/12/06/reiser-boyfriend-says-mom-wouldnt-abandon-her-kids/“Reiser Kids Called Mom a Lying Thief, Boyfriend Testifies.” SF Gate, December 6, 2007.https://www.sfgate.com/bayarea/article/Reiser-kids-called-mom-a-lying-thief-boyfriend-3233193.php“Hans Reiser's Angry E-Mails to His Wife Read in Oakland Court.” SF Gate, November 28, 2007.https://www.sfgate.com/bayarea/article/Hans-Reiser-s-angry-e-mails-to-his-wife-read-in-3235626.php“The Mystery of Missing Nina.” ABC News, November 16, 2007.https://abcnews.go.com/2020/story?id=3807336&page=1“Son Says Hans Reiser May Have Killed His Mom.” San Francisco Examiner, November 14, 2007.https://www.sfexaminer.com/news/son-says-hans-reiser-may-have-killed-his-mom/“Murder, Code and Hans Reiser.” eWeek, November 5, 2007.https://www.eweek.com/servers/murder-code-and-hans-reiser“Wired Weighs in on the Hans Reiser Case.” East Bay Express, June 29, 2007.https://www.eastbayexpress.com/SevenDays/archives/2007/06/29/wired-weighs-in-on-the-hans-reiser-case“Judge Says Linux Guru Hans Reiser Can Stand Trial for Murder.” Wired, March 9, 2007.https://www.wired.com/2007/03/judge-says-linu/“Nina Reiser's Boyfriend Has 'Glimmer Of Hope'/Billboards With Missing Mom's Photo Unveiled.” SF Gate, October 11, 2006.https://www.sfgate.com/bayarea/article/Nina-Reiser-s-boyfriend-has-glimmer-of-hope-2486701.php“Woman Missing; Husband's Home Searched: Police Seek Estranged Husband.” ABC News, September 14, 2006.http://abclocal.go.com/kgo/story?section=local&id=4558883&ft=print“Hans Thomas Reiser.” Murderpedia, n.d.https://murderpedia.org/male.R/r/reiser-hans-thomas.htm“Hans Reiser.” People Pill, n.d.https://peoplepill.com/people/hans-reiser/“Hans Reiser.” Wikipedia, n.d.https://en.wikipedia.org/wiki/Hans_Reiser“Oakland, California.” City of Oakland Website, n.d.https://www.oaklandca.gov/topics/facts-about-oakland“Welcome to the Open Computing Facility!” Berkley.edu, n.d.https://www.ocf.berkeley.edu

Motivated to Lead Podcast - Mark Klingsheim
Episode 44: Leading During a Crisis Interview with Jack Porter CEO, Cognizer

Motivated to Lead Podcast - Mark Klingsheim

Play Episode Listen Later Mar 26, 2020 32:14


In this week's episode, we interview Jack Porter, CEO of Cognizer. Jack shares his thoughts around managing in crisis in this new environment.  Jack is a serial entrepreneur who has been the CEO of eleven startups. He has extensive experience in advanced analytics, machine learning, and artificial intelligence. His expertise includes understanding how to leverage complex mathematical algorithms, data visualizations, and sophisticated business models. Mr. Porter has worked on some of the largest AI projects in the world at companies like American Express, Discover Card, Merck, GlaxoSmithKline, and Reliance Jio. He has a comprehensive understanding of traditional machine learning models, neural networks, and advanced deep learning. Mr. Porter has published eight books on technology innovation and entrepreneurship. He often speaks at industry events like the Kellogg Innovation Network, Gartner Group Research Board, and AI by the Bay. He is also a regular contributor to magazines such as Infoworld, CIO Magazine, and eWeek.

Seamless Podcast with Darin Andersen
CyberTECH eWeek Breakfast Panel Discussion at RSA Conference 2020| Seamless Podcast: FutureCon CyberSecurity Series

Seamless Podcast with Darin Andersen

Play Episode Listen Later Mar 16, 2020 96:44


The Seamless Podcast is excited to bring you a brand new podcast series on CyberSecurity and the Human Element in collaboration with FutureCon Events. Kim Hakim, founder and CEO of FutureCon will join Darin and Mike in welcoming industry leaders to discuss the challenges and opportunities that are ever present in this constantly connected world. Our kickoff episode features a roundtable discussion that took place at this year's CyberTECH & eWeek Bangers and Mash breakfast event at RSA Conference 2020.

Engineering Influence from ACEC
DiscoverE Discusses eWeek 2020

Engineering Influence from ACEC

Play Episode Listen Later Feb 19, 2020 15:09


It's National Engineers Week, or eWeek, for short, and there's no better way to celebrate this week of recognition than to sit down with the organizers of the event itself, DiscoverE. Engineering Influence sat down with Thea Sahr, DiscoverE's Director of Communications and Programs to talk about the week, the events happening across the country and how eWeek has grown into a year long celebration of engineering.Transcript:Host: Welcome back once again to ACEC's Engineering Influence podcast. I'm your host, Alan Crockett, Director of Member Communications and it's Eweek, everywhere around here at ACEC and throughout a lot of places in the US this week. And as a result, we are very, very honored and pleased to have Ms. Thea Sahr. She's the DiscoverE Director of Communications and Programs, that has a lot to do with all the activities that are going on in celebration of Engineering Week. Thea, welcome to Engineering Influence podcast.Thea: Thanks Alan. I'm really happy to be here.Host: Well I know this is a busy busy time for you. Is this like Christmas season for a DiscoverE?Thea: Oh, it sure is. It sure is. You know, you work year round, getting ready, getting all the materials, all the resources together, and then you kind of watch what everyone around the country does to be pioneers of progress and really engage kids and celebrate all the wonderful things that engineers are doing. One of my favorite things to do during Engineer's Week is to Google Engineer's Week 2020 (#eWeek2020) and just see everything that people are doing. It's really incredible.Host: Well, that's a very interesting because I think a lot of people don't realize that Engineering Week celebrations are throughout the next year.Thea: You're right.Host: We're at the beginning and and we've got a whole week worth of activities planned. What so how things are going so far?Thea: Things are going great. You know, across the country on engineering universities at college campuses, their celebrations lots of small and medium sized engineering firms are going out there, volunteering with their local schools. Some of our larger corporations are doing multiple events around the country, but it's really individuals out there, people who say, you know, this week I'm going to go into my kids' school, or this week I'm gonna work and find an organization that I can partner with. And you know, while we call it Engineer's Week, it's really a 365 year round mindset of, you know, just taking a moment, volunteering, going out there, talking to a child about what engineering is. Cause sometimes we forget that you know, us an engineering community, we know a lot of engineers. We know what engineers do. Most Americans don't know what engineers or technicians do. They've never met one. They don't run across them in their daily lives. So and we know that role modeling and telling kids what's involved in engineering is one of the first and best ways to engage kids and get them excited.Host: Well, we have, you know, ACEC represents more than 5,200 individual engineering firms throughout the nation. And it's always a pleasure to just see all the activities that our member firms are engaged in. And I remember organizations to celebrate the the importance of, of engineers and engineering overall. So tell me a little bit about yourself. How long have you been involved with the discovery?Thea: I've been involved with DiscoverE for nine years. But before that, I mean, I've been an employee of discovery for nine years, but I've been an Engineer's Week volunteer and advocate for the last 20 years. I was at a PBS station in Boston and we created Design Squad and Engineer Your Life. So I've been working to engage kids in engineering for a long time. And yeah, and what I like about it is we really think that engineering is the gateway to math and science. You know, that that's that hands on problem solving you get the kids hooked that way and then all of a sudden they're going to be like, Oh, if I know math and science, if I know those concepts, then my, you know, my catapult or my lever or whatever they're working on or whatever problem they're trying to solve, they'll go and look for the science and then it becomes real. And then, you know, engineers and engineering can really answer that "so what" question for kids?Host: Well it sounds like, you know, these programs also help take the fear of mathematics out of the equation and brings it back to a more realistic, a realistic plane for, for kids who are curious and wondering what to do and how things work. I was scared to death of math coming through school, so that's why I went into words. I can handle words, but math is kinda hard. Well, I know we had we, you know, in, in DC we, we had the big future cities competition yesterday and we got a lot of pictures and some story for that for our blog. Tell me what else is, what are the other big highlights that are coming up through the end of the week, both here and throughout the nation that you guys are focuses on?Thea: Right, right. Yes. So future cities, our competition for middle school students where we ask them to design and build a city of the future. With 45,000 students from around the world participate and we crowned the world champions yesterday and they're from Indiana, which is very exciting. So that was great. So a big shout out to them and their hard work. And then tomorrow, Thursday the 20th, is introduce a girl to engineering day. So that's a time during seven days to really focus in on girls who may not know about engineering or be engaged in engineering. And you know, we've turned a lot of attention to this area, but there's still a lot of work to be done to kind of bring more girls into the fold. And so we released a report back in December called despite the odds where we looked at why girls choose STEM and why women stay in the field.Thea: You know, we know all the reasons why they leave, but we were like, what can we learn from why they stay? And what we've found is the importance of role models. You know, volunteers going out there talking to kids, doing hands on engineering activities and, and telling them what engineering is, how engineers solve problems, what those problems are, you know, what are the kinds of fascinating things all of your members and their employees are working on. That's, you know, and there's no magic bullet, right? It's just really getting out there and, and doing the outreach. We know the formula. We just need more people to be doing it. And that's what we love so much about ACEC and your members is that they're so close to their local communities that they're doing that work. And we just want to give a big shout out to everyone and say thank you and keep on keeping on.Host: Oh, excellent. Excellent. That will bring a smile to a lot of people's faces. And just on a personal note, I've been at ACEC for 17 years and I've been going to you know, the national meetings, the fall conferences and the annual convention twice a year. And I've noticed a difference just in, for example, we would get 800 to a thousand attendees at these conferences and it would be rare back in, you know, 15 years ago, it'd be kind of rare to see a woman engineer. Everybody would notice. It's not rare, it's not rare anymore. And you know, just to dovetail on that, we give numerous scholarships out to engineering students to help them finish and proceed in their educations. And I had noticed that over the years you know, five out of, you know, six out of 10 scholarships that we give out, we'e going to women, we're going to women students. So I think your messages and your your efforts are paying off - women are engineers and it's not a rare thing anymore. And I'm old enough to be able to realize that. So kudos to everybody at DiscoverE. So tell me what does discovery really want to accomplish? What's the overall mission of your organization?Thea: So we have a dual mission of celebrating engineers and you know, really elevating the field. And, and giving a big, you know, making sure that the world, just how much engineers contribute to, to our way of life and making the world a safer, stronger, better place. Right. That's, you know the work that engineers do is just, is mission critical and it is awesome. And then our second our, our second piece of that pie is really encouraging kids to investigate and explore engineering. We know not every child is going to become an engineer, no one wants that. But if we could give kids the, the tools, the engineering design process, project management, if they take those skillsets, any career, imagine how effective they could be just to kind of break down large problems into bite sized chunks and tackle them and solve them. And, and, and, and bring that kind of mindset. I think would be wonderful. And our big audacious goal is that every child around the world, every year has an engineering experience. You know, cause so many kids just don't know that it exists or it's even a possibility or that they have, you know, that they have the chops for it.Host: Or the role that engineers play in practically everything that goes on. So.Thea: Exactly.Host: So really incredible and worthy, worthy endeavor for sure. You said you'd been there for discovery as you know, working on staff and then, but you said you had volunteered before. What changes have you seen in what DiscoverE offers and, and tries to accomplish over the years? And how have you seen that reflect on the results and the reaction to your efforts?Thea: Sure. I think, you know like all good engineering organizations has been an iterative learning process, right? Try something or put it out there, what works, how can we make it better? How can we make it better? And we look at the evolution of the resources that we offer the training that we offer. We're continually saying, okay, you know, what's resonating with the kids, what messages can we share? What hands on activities can we share, what's working? And then just, you know, constantly improve the resources and the delivery mechanisms that we have, you know, as technology changes, can we take advantage of of community, you know, ways to communicate to reach more students. You know, if you're in a rural area, can we try a webinar, you know, a webcast bringing on an engineer right into your classroom electronically.Thea: So I think, you know, we're always willing to try new things. And I think that the volunteers out there working with kids are a lot more, and sophisticated is not quite the right word, but they've been doing it a long time. They know what works. And so it's really listening to all our wonderful volunteers out there and responding to what they're asking for, what resources they need. You know, cause we can't, we're a tiny staff of six people. So how do we support the work of 50,000 volunteers out there reaching a million kids? So I think that's just kind of our constant thinking is, what do you guys need? What do you gals need and how can we help you?Host: Yeah. Well, you know, I think one of the one of the benefits also that I had discovered when, when preparing communications for the upcoming Engineers Week I went to the DiscoverE website and, and you guys provide all kinds of ideas and, and, and, and pointers for activities to further on your mission that I believe a lot of our member firms who, and I've talked to a few, they want to do something but they just don't know quite what to do. What's the best way to go about it? I think going to your website would be would be a great thought starter on PRI trying to, you know, basically pitch in and do our part as an industry.Thea: Well definitely we have a right on our homepage. You can download the ultimate how to guide. In four pages it outlines for you what you can do to engage a child in engineering. And there's really simple steps and then it takes you to all the other resources. But we have an extensive library of activities. We have an extensive library of how, you know, messages that you can share with kids. And like some people are like, I don't even know how to reach out to my school. I have a cheat sheet of what you can say and, and and who you should ask for when you call the school. So, you know, how do you arrange a classroom visit? So, and then videos of engineers. And then we have an extensive section on engineering careers, so you can send kids who might be interested in engineering to our website. So it's all there. DiscoverE with an E dot org. I hope folks will visit usHost: I'm pretty sure they will. I know you're very busy lady. You getting ready to head back to Boston. So good luck to you. Thank you for sharing a few minutes with us this morning. And good luck to the entire, for the rest of the week of all the activities you guys have your hands on and we'll see you again next time.Thea: Yeah, thank you and thanks to all the pioneers of progress out there, all of your engineers, your technicians who are, who are, you know, doing such great work to make my life easier and safer. I really appreciate it.Host: Okay, thanks Thea and have a good day and we'll see you on the next one. Enjoy.Thea: Okay. Bye. Bye.Host: Once again, that was Thea Sahr, Director of Communications for DiscoverE, which basically coordinates all the eWeek and Engineering Week activities that just don't occur once a week. There are ongoing throughout the year program and activities and knowledge and awareness and seminars and they obviously do an excellent job. So thank you for joining us today. My name is Alan Crockett, once again, Director of Member Communications and we'll see you on the next side. Enjoy.

WitzEnd
WitzEnd Podcast - Chris Preimesberger of eWEEK

WitzEnd

Play Episode Listen Later Mar 19, 2019 54:02


We are back with a new episode of the WitzEnd podcast. This week we speak with Chris Preimesberger, the Editor-in-Chief of eWEEK. His work spans over three decades, covering the IT industry in a variety of sectors making himself a household name in his own right. He is also the creator of eWEEK Innovation site and of #eWEEKchat – a real-time chat room where people can tune into and talk all things IT. Chris joins us to talk about his career, the rise of the internet, his first gig as a “copy boy,” and how Apple was almost not the Apple we know today.

Inside The Media Minds
Inside the Media Minds Episode 20: Sean Kerner, eWeek @RSA 2019

Inside The Media Minds

Play Episode Listen Later Mar 7, 2019 14:51


In this special episode of #IMM, Christine and Tony catch up with Sean Kerner at RSA, discussing Sean's reporting focus, his rise as a leading technology journalist and much more. "Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites."

CISO-Security Vendor Relationship Podcast
Shoving Money Down Security's Bottomless Pit

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jan 7, 2019 32:38


No matter how much money we shove into security, it never seems to fill up. That's good for vendors. Not so good for buyers of security who don't have a bottomless pit of money to fill the bottomless pit of security.   This week's episode is sponsored by Red Canary. Red Canary is a security operations ally to organizations of all sizes. They arm customers with outcome-focused solutions that can be deployed in minutes to quickly identify and shut down adversaries. Follow their blog for access to educational tools and other resources that can help you improve your security program. Got feedback? Join the conversation on LinkedIn On this episode How CISOs are digesting the latest security news Wayne Rash of eWEEK wrote a piece on what to expect in cybersecurity in 2019. Most of the stuff is more of the same, such as nation state attacks, ransomware, phishing, and assume you're going to get attacked. But, he did bring up some issues that don't get nearly as much discussion. One was cryptomining which is hijacking your cloud instances, encrypting ALL data, moving away from usernames/passwords, and getting a third-party audit. So what's on CISOs' radar in 2019 Why is everybody talking about this now? Dutch Schwartz of Forcepoint brought up the issue of collaboration. This is not a new topic and we all know that if we don't share information the attackers who do share information will always have leverage. There are obvious privacy and competitive reasons why companies don't share information, but I proposed that if the industry believes collaboration is so important, then it should be a requirement (think GDPR) or we should build incentives (think energy incentives) with a time limit. Is this the right approach? Is the collaboration we're doing already enough? What's Worse?! We play yet another round on an issue that really annoys my co-host. What's a CISO to do? Thom Langford, CISO of Publicis Groupe, said that cybersecurity should be seen as a long term campaign. And if you keep at it, you will see results. Think anti-smoking or seat belt campaigns. Yet we see more and more companies treating security as a one-off project and not looking at dealing with it in the long term. Could this be more a problem of how we view security in the media? Ask a CISO Brijesh Singh, Inspector General of Police, Cyber at Government of Maharashtra said, "A young student asked me a very basic question, isn’t Cybersecurity just a branch of IT? Why should it be treated separately?" It's an awesome question that resulted in a flurry of responses. Is there a difference? Got feedback? Join the conversation on LinkedIn  

Inside The Media Minds
Inside the Media Minds Episode 17: Fahmida Rashid, Decipher

Inside The Media Minds

Play Episode Listen Later Dec 18, 2018 28:50


In this episode, Christine talks with Decipher's Fahmida Rashid. Fahmida discusses how she got into journalism, her predictions on what will dominate headlines in 2019, and much more! "I am an award-winning technology journalist with experience covering nearly every aspect of the technology industry, my primary focus is writing about cybersecurity and privacy. I've written in various formats, including newspapers, online media, and magazines. I am currently a senior managing editor at Decipher, covering security for an enterprise IT audience. I write about cloud security and networking, application security, DevOps, and all the areas in between. Previously, as the senior writer at InfoWorld and CSO Online, I focused on technical analysis and commentary for IT and security professionals. As the Editor-in-Chief of RSA Conference, I developed year-round content to engage with the infosec community on a more regular basis. I was a senior writer at eWEEK, senior technical editor for CRN Test Center, and a reporter covering networking infrastructure for Forbes.com. I started my journalism career writing business news at Women's Wear Daily."

media chief forbes minds devops decipher rsa conference infoworld eweek cso online women's wear daily fahmida rashid
The Jason Cavness Experience
The cavnessHR Podcast - A talk with Robert Lee a career entreprenuer

The Jason Cavness Experience

Play Episode Listen Later Oct 1, 2018 32:11


Robert Lee is a career entrepreneur who sometimes refers to himself as the Forrest Gump of high tech. His diverse adventures encompass computer programming and hardware design, marketing consulting, advertising and electronic payment systems. As the founder and chief strategist behind successful businesses in both the U.S. and Canada, Lee and his companies have received national media exposure that included coverage in the New York Times and the front page of PC Week (now eWeek). Robert currently lives and works in the Seattle, WA area.  See acast.com/privacy for privacy and opt-out information.

Relentless Health Value
EP172: The Convergence of Payers and Providers - A Critical Step Forward, Fraught With Challenges, With John Moore, CEO and Founder of Chilmark Research

Relentless Health Value

Play Episode Listen Later Mar 1, 2018 33:46


Moore, is CEO of the health care IT analyst firm, Chilmark Research, which he founded in 2007. Chilmark Research was founded on the simple premise of conducting the best research possible that will ultimately lead to improvements in the quality of care a patient receives. Having spent many years in other industry sectors, Moore has seen the dramatic improvements possible through effective adoption and use of IT and is convinced that the same can occur in health care. A core thesis for Chilmark Research is to help guide the industry in specific subsectors of the health IT landscape by focusing on those technology domains that will be truly transformational to the delivery of care. Current areas of research include: analytics, care management and coordination, interoperability, population health management, engagement, and most recently provider-payer convergence. Prior to founding Chilmark Research, Moore led a diverse worldwide team at Dassault Systèmes, based in Paris. As head of corporate, worldwide industry and market intelligence, he worked with the executive leadership to define key global market opportunities, forecast growth, and develop critical paths to market for its numerous software products. Moore has held a number of other senior positions during his career including: SVP at analyst firm ARC Advisory Group; Research Associate at MIT; VP of Marketing for an analytical instrument company; and policy analyst for the Commonwealth of Massachusetts. An accomplished speaker, Moore has made numerous presentations on current and future IT trends and their impact to markets. Widely quoted in numerous publications, he has also been interviewed by: AMA News, CIO, CNBC, Computerworld, eWeek, Health Data Management, HealthIT News, InformationWeek, Investors Business Daily, US News & World Report, The Washington Post, and The Wall Street Journal. 00:00 Convergence and the delivery of health care. 02:20 “How do we deliver greater value?” 03:00 Why establishing health plans within a provider organization is often not the best idea. 04:30 How you can get around needing prior authorization and subsequently cut costs. 05:50 The motivation for a payer and provider to form a partnership. 08:00 Why consolidation doesn't necessarily drive down costs. 08:50 Payer-provider population health management. 09:20 Understanding where the patient might be going outside of the network to get their health care. 10:00 What does it take to be good at collaboration? 10:30 “What is the opportunity here?” 10:40 “Is there a level of trust between the payer and provider?” 18:00 Advice for payers looking to partner with providers. 18:50 Look for someone wanting to deliver high-value care. 19:30 “Trust, then verify.” 23:00 New and interesting innovations coming out of current convergences. 24:00 Things still being worked out in the market today. 25:25 The innovator's dilemma. 26:30 “How do you scale quickly?” 27:20 “Is that scalable?” 30:20 The path forward for most markets in the United States. 31:45 What Chilmark Research is and does. 32:45 Learn more by going to chilmarkresearch.com and find a free copy of the 2017 Healthcare Analytics Market Trends Report during March!

Monday Morning Dumpster Dive
Executive Order Changes Reservist Recall Procedures

Monday Morning Dumpster Dive

Play Episode Listen Later Oct 23, 2017 4:05


Wayne Rash is a retired Naval officer and technology writer for eWEEK. Resources: Image by Angelo Baumgartner Intro music by The Hellfreaks: www.thehellfreaks.com

Cyber Security Interviews
#004 – Nicholas Percoco: Don’t Second Guess Yourself

Cyber Security Interviews

Play Episode Listen Later Dec 12, 2016 86:11


Uptake (https://uptake.com/) . Prior to Uptake, Nicholas was the Vice President of Global Services at Trustwave (https://www.trustwave.com/home/) where he led more than 2000 incident response and forensic investigations globally, ran thousands of ethical hacking & application security tests for clients, and conducted bleeding-edge security research to improve Trustwave's products. Before Trustwave, Nick ran the security consulting practices at VeriSign, & Internet Security Systems. In 2004, he drafted an application security framework that became known as the Payment Application Best Practices (PABP). In 2008, this framework was adopted as a global standard called Payment Application Data Security Standard (PA-DSS). As a speaker, he has provided unique insight around security breaches, malware, mobile security and InfoSec trends to public ( OWASP (https://www.owasp.org/) ) & private audiences (Including DHS, US-CERT, Interpol, United States Secret Service) throughout the world. Nick's research has been featured by media including: The Washington Post, eWeek, PC World, CNET, Wired, Network World, Dark Reading, Fox News, USA Today, Forbes, Computerworld, CSO Magazine, CNN, The Times of London, NPR, Gizmodo, Fast Company, Financial Times & The Wall Street Journal. Nick is also the creator of The Cavalry (https://www.iamthecavalry.org/about/overview/) movement. In this interview we discuss his early start with computers, what is a hacker, developing a methodology for penetration testing, how he developed the SpiderLabs name, analytics and automation, when you should evaluate opportunities, moving past the fear of public speaking, his personal "drink-a-different-beer-a-day" contest, research and public disclosure of vulnerabilities, how to secure Internet connected devices, where he recruits talent, and much more. I hope you enjoy this discussion. Please leave your comments below! Where you can find Nick: LinkedIn (https://www.linkedin.com/in/c7five) Twitter (https://twitter.com/c7five) THOTCON (http://thotcon.org/) I am the Cavalry (https://www.iamthecavalry.org/about/overview/)

Bill Murphy's  RedZone Podcast | World Class IT Security
#047: How to Make Better IT Security Investment Decisions

Bill Murphy's RedZone Podcast | World Class IT Security

Play Episode Listen Later Jun 14, 2016 53:30


Marshall Kuypers is a PhD candidate in Management Science and Engineering at Stanford University, concentrating in Risk Analysis. His research studies quantitative models to assess cyber security risk in organizations. I heard Marshall talk at a major IT Security conference and after listening to him, I knew that I had to get him on the show to share his expertise. Marshall continues a theme that I have been harping on recently which is for you to deepen your sophistication of communicating at the highest level in your organization about Cyber Risk and investments that you want your company to mitigate against. For some of you this discussion will be re-enforcement of concepts and ideas that you already know but need to be reminded of. For others, Marshall will bring a fresh approach to you to test with your CFO, CEO or Board. The more effective you can be with communicating to your horizontal peers and upstream reports the better you can fulfill your mission within your company. Major take aways from this episode are: 1. A Practical and actionable discussion regarding Risk Analysis for Cyber Security 2. How Develop situational awareness for making better IT Security Investment Decisions 3. How to look at your internal security event data in a different way (no not your log data) to support IT Security investment. 4. How to validate or eliminate intuition from assessing probability of IT Security events happening. 5. How to eliminate recency bias from IT Security decisions (Fear and uncertainty cranked by media). 6. We also discuss power laws and complex systems theory which is fun as well. I have linked up all the show notes on redzonetech.net/podcast where you can get access to Marshall's presentation and research. About Marshall Marshall Kuypers is a PhD candidate in Management Science and Engineering at Stanford University, concentrating in Risk Analysis. His research studies quantitative models to assess cyber security risk in organizations. Marshall has a diverse background spanning many fields, including modeling cyber security, developing trading algorithms with a high frequency trading company, researching superconducting materials at UIUC, and modeling economic and healthcare systems with the Complex Adaptive Systems of Systems (CASoS) engineering group at Sandia National Labs. Marshall is also the Co-President of the Stanford Complexity Group and a predoctoral science fellow at the Center for International Security and Cooperation (CISAC) at Stanford. Read full transcript here. How to get in touch with Marshall Kuypers: mkuypers@stanford.edu Key Resources: Stanford University CISAC Profile RSA presentation Practical Quantitative Risk Analysis for Cyber Systems Power Laws Veris Community  - Privacy Rights Clearing House Title Quoted on Eweek : http://www.eweek.com/security/security-researchers-challenge-claims-data-breaches-increasing.html Books Mentioned: Thinking, Fast and Slow by Daniel Kahneman This episode is sponsored by the CIO Scoreboard, a powerful tool that helps you communicate the status of your IT Security program visually in just a few minutes. Credits: * Outro music provided by Ben’s Sound Other Ways To Listen to the Podcast iTunes | Libsyn | Soundcloud | RSS | LinkedIn Please Leave a Review  Support this growing and thriving program by giving us a review here Click here for instructions on how to leave an iTunes review if you're doing this for the first time. About Bill Murphy Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT business leader. Follow Bill on LinkedIn and Twitter.

DEF CON 22 [Materials] Speeches from the Hacker Convention.
Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Play Episode Listen Later Dec 12, 2014


Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Cerrudo/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo CTO, IOACTIVE LABS Probably many of us have seen that scene from "Live Free or Die Hard" (Die Hard 4) were the "terrorist hackers" manipulate traffic signals by just hitting Enter key or typing a few keys, I wanted to do that! so I started to look around and of course I couldn't get to do the same, that's too Hollywood style! but I got pretty close. I found some interesting devices used by traffic control systems on important cities such as Washington DC, Seattle, New York, San Francisco, Los Angeles, etc. and I could hack them :) I also found that these devices are also used in cities from UK, France, Australia, China, etc. making them even more interesting. This presentation will tell the whole story from how the devices were acquired, the research, on site testing demos (at Seattle, New York and Washington DC), vulnerabilities found and how they can be exploited, and finally some possible NSA style attacks (or should I say cyberwar style attacks?) Oh, I almost forgot, after this presentation anyone will be able to hack these devices and mess traffic control systems since there is no patch available (sorry didn't want to say 0day ;)) I hope that after this I still be allowed to enter (or leave?) the US Cesar Cerrudo is CTO at IOActive Labs where he leads the team in producing ongoing cutting edge research in the areas of SCADA, mobile device, application security and more. Formerly the founder and CEO of Argeniss Consulting, acquired by IOActive, Cesar is a world renown security researcher and specialist in application security. Throughout his career, Cesar is credited with discovering and helping to eliminate dozens of vulnerabilities in leading applications including Microsoft SQL Server, Oracle database server, IBM DB2, Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Windows, Yahoo! Messenger, etc. In addition, Cesar has authored several white papers on database, application security, attacks and exploitation techniques and he has been invited to present at a variety of companies and conferences including Microsoft, Black Hat, Bellua, CanSecWest, EuSecWest, WebSec, HITB, Microsoft BlueHat, EkoParty, FRHACK, H2HC, Defcon, Infiltrate, etc. Cesar collaborates with and is regularly quoted in print and online publications including eWeek, ComputerWorld, and other leading journals. Twitter: @cesarcer

All Things That Fly RC Podcast
ATTF #289 - Back on the Air with Vintauri

All Things That Fly RC Podcast

Play Episode Listen Later Jul 6, 2014 58:17


We Are Back! This week Daniel is off, so Lucien invited Steve Mills (AKA Vintauri) to join him for a show about the upcoming Watts Over Owatonna Electric Fly-in. Also discussed in this show is a listener E-Mail and some past and upcoming flying events. Mentions: 2014 Toledo Show Photos Palomar R/C Flyers Club Academy of Model Aeronautics AMA request for response from FAA E-Flite Blade 350 QX DJI S-1000 Octocopter Trex 800 Camera Heli Go-Professional Cases Sig T-Clips EP ARF SIG Somethin' Xtra EG ARF 2014 Watts Over Owatonna, July 25-27 2014 IRCHA Jamboree, August 6-10 2014 NEAT Fair, September 12-14 2014 Heli Extravaganza, September 19-21 2014 eWeek, September 24-28 RC Dude Hobbies - Really Cool Radio Control Electric Flight Higher Plane Productions 3DRCForums

lucien eweek attf
All Things That Fly RC Podcast
ATTF #289 - Back on the Air with Vintauri

All Things That Fly RC Podcast

Play Episode Listen Later Jul 6, 2014 58:17


We Are Back! This week Daniel is off, so Lucien invited Steve Mills (AKA Vintauri) to join him for a show about the upcoming Watts Over Owatonna Electric Fly-in. Also discussed in this show is a listener E-Mail and some past and upcoming flying events. Mentions: 2014 Toledo Show Photos Palomar R/C Flyers Club Academy of Model Aeronautics AMA request for response from FAA E-Flite Blade 350 QX DJI S-1000 Octocopter Trex 800 Camera Heli Go-Professional Cases Sig T-Clips EP ARF SIG Somethin' Xtra EG ARF 2014 Watts Over Owatonna, July 25-27 2014 IRCHA Jamboree, August 6-10 2014 NEAT Fair, September 12-14 2014 Heli Extravaganza, September 19-21 2014 eWeek, September 24-28 RC Dude Hobbies - Really Cool Radio Control Electric Flight Higher Plane Productions 3DRCForums

lucien eweek attf
TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2012.01.08: NSA Recommendations for Computer Security; Now That I Have an Android Tablet ...; Paying for Journalism; and Short Circuits.

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Jan 7, 2012 30:04


The NSA has recommendations to keep your computer safe. I have an Android tablet an Eweek says I'm stupid. Do we need journalists? In Short Circuits, PARC is profitable, Verizon relents, and Netflix rallys.

All Things That Fly RC Podcast
ATTF #203 - Coverage of eWeek, the Electric Nall

All Things That Fly RC Podcast

Play Episode Listen Later Oct 12, 2011 84:07


Daniel, Lucien, Moose, and Diggs talk about new products, eWeek and Triple Tree, and some PSCs for your RC fix this week.   Mentions: 63” EPO Pitts 3DHS New 38” EPP Slick 3DHS 34" Edge EPP 3DHS 120" Extra 330LX Helium-filled RC Airliner ATTF October Giveaway LA3D Heli Fun-Fly 3D Fun-Fly 9021X

All Things That Fly RC Podcast
ATTF #203 - Coverage of eWeek, the Electric Nall

All Things That Fly RC Podcast

Play Episode Listen Later Oct 12, 2011 84:07


Daniel, Lucien, Moose, and Diggs talk about new products, eWeek and Triple Tree, and some PSCs for your RC fix this week.   Mentions: 63” EPO Pitts 3DHS New 38” EPP Slick 3DHS 34" Edge EPP 3DHS 120" Extra 330LX Helium-filled RC Airliner ATTF October Giveaway LA3D Heli Fun-Fly 3D Fun-Fly 9021X

MobileBeyond
Mobile Cloud Computing Likes Dumb Smartphones

MobileBeyond

Play Episode Listen Later Apr 13, 2011 2:09


Mobile Cloud Computing is taking the world by storm as desktop computers fade into oblivion. Steve Ballmer of Microsoft, speaking at the Gartner Symposium last October 2010, “hinted,” as EWeek wrote, those Windows smartphones were just like desktops and laptops. In other words, these powerful new mobile devices are only miniatures of bigger gadgets, like […]

Sun News
Sun News -- The Week in Review

Sun News

Play Episode Listen Later Oct 23, 2009 4:19


Hosts Chhandomay Mandal and Maijaliisa Burkert review Sun in the news this week, including Sun's announced top spot for tape storage automation revenue for the first half of 2009, as well as an eWeek article discussing Solaris' optimization for Intel Nehalem processors.

sun intel solaris sun news eweek tape storage
Sun News
Sun News -- The Week in Review

Sun News

Play Episode Listen Later Oct 23, 2009 4:19


Hosts Chhandomay Mandal and Maijaliisa Burkert review Sun in the news this week, including Sun's announced top spot for tape storage automation revenue for the first half of 2009, as well as an eWeek article discussing Solaris' optimization for Intel Nehalem processors.

sun intel solaris sun news eweek tape storage
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Jeremiah Grossman: Phishing with Super Bait (English)

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference

Play Episode Listen Later Oct 31, 2006 65:44


"The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It?s imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We?re all very familiar with each of those issues. Instead, we?ll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security R&D and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent international conference speaker at the Blackhat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ABC News (AU), ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites."

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
Technology Corner 2006.07.30: Linux, personal computers, Firefox, and spam

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Jul 30, 2006 20:36


Xandros, a Linux variant, is challenging Microsoft in the marketplace with an attempt to grab some of the 50 million people who are still using Windows 95, 98, and Me. Eweek magazine this week looked back at 25 years of personal computing. Nerdly News considers annoyances in the latest patch for Firefox and looks into the spambox.

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We're all very familiar with each of those issues. Instead, we'll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security Rresearch and developmentD and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent conference speaker at the BlackHat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites.

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 54:51


Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowledge or consent, your web browser is silently hijacked to transfer out bank funds, hack other websites, or post derogatory comments in a public forum. No traces, no tracks, no warning sirens. In 2005’s "Phishing with Superbait" presentation we demonstrated that all these things were in fact possible using nothing more than some clever JavaScript. And as bad as things are already, further web application security research is revealing that outsiders can also use these hijacked browsers to exploit intranet websites. Most of us assume while surfing the Web that we are protected by firewalls and isolated through private NAT'ed IP addresses. We assume the soft security of intranet websites and that the Web-based interfaces of routers, firewalls, printers, IP phones, payroll systems, etc. even if left unpatched, remain safe inside the protected zone. We believe nothing is capable of directly connecting in from the outside world. Right? Well, not quite. Web browsers can be completely controlled by any web page, enabling them to become launching points to attack internal network resources. The web browser of every user on an enterprise network becomes a stepping stone for intruders. Now, imagine visiting a web page that contains JavaScript malware that automatically reconfigures your company’s routers or firewalls, from the inside, opening the internal network up to the whole world. Even worse, common Cross-Site Scripting vulnerabilities make it possible for these attacks to be launched from just about any website we visit and especially those we trust. The age of web application security malware has begun and it’s critical that understand what it is and how to defend against it. During this presentation we'll demonstrate a wide variety of cutting-edge web application security attack techniques and describe bestpractices for securing websites and users against these threats. You’ll see: * Port scanning and attacking intranet devices using JavaScript * Blind web server fingerprinting using unique URLs * Discovery NAT'ed IP addresses with Java Applets * Stealing web browser history with Cascading Style Sheets * Best-practice defense measures for securing websites * Essential habits for safe web surfing Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security R&D and industry evangelism. As an well-known and internationally recognized security expert, Mr. Grossman is a frequent speaker at the Black Hat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writing, and interviews have been published in dozens of publications including USA Today, VAR Business, NBC, ABC News (AU), ZDNet, eWeek, Computerworld and BetaNews. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites. T.C. Niedzialkowski is a Senior Security Engineer at WhiteHat Security in Santa Clara, California. In this role, he oversees WhiteHat Sentinel, the company's continuous vulnerability assessment and management service for web applications. Mr. Niedzialkowski has extensive experience in web application assessment and is a key contributor to the design of WhiteHat's scanning technology."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 54:51


"Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowledge or consent, your web browser is silently hijacked to transfer out bank funds, hack other websites, or post derogatory comments in a public forum. No traces, no tracks, no warning sirens. In 2005’s "Phishing with Superbait" presentation we demonstrated that all these things were in fact possible using nothing more than some clever JavaScript. And as bad as things are already, further web application security research is revealing that outsiders can also use these hijacked browsers to exploit intranet websites. Most of us assume while surfing the Web that we are protected by firewalls and isolated through private NAT'ed IP addresses. We assume the soft security of intranet websites and that the Web-based interfaces of routers, firewalls, printers, IP phones, payroll systems, etc. even if left unpatched, remain safe inside the protected zone. We believe nothing is capable of directly connecting in from the outside world. Right? Well, not quite. Web browsers can be completely controlled by any web page, enabling them to become launching points to attack internal network resources. The web browser of every user on an enterprise network becomes a stepping stone for intruders. Now, imagine visiting a web page that contains JavaScript malware that automatically reconfigures your company’s routers or firewalls, from the inside, opening the internal network up to the whole world. Even worse, common Cross-Site Scripting vulnerabilities make it possible for these attacks to be launched from just about any website we visit and especially those we trust. The age of web application security malware has begun and it’s critical that understand what it is and how to defend against it. During this presentation we'll demonstrate a wide variety of cutting-edge web application security attack techniques and describe bestpractices for securing websites and users against these threats. You’ll see: * Port scanning and attacking intranet devices using JavaScript * Blind web server fingerprinting using unique URLs * Discovery NAT'ed IP addresses with Java Applets * Stealing web browser history with Cascading Style Sheets * Best-practice defense measures for securing websites * Essential habits for safe web surfing Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security R&D and industry evangelism. As an well-known and internationally recognized security expert, Mr. Grossman is a frequent speaker at the Black Hat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writing, and interviews have been published in dozens of publications including USA Today, VAR Business, NBC, ABC News (AU), ZDNet, eWeek, Computerworld and BetaNews. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites. T.C. Niedzialkowski is a Senior Security Engineer at WhiteHat Security in Santa Clara, California. In this role, he oversees WhiteHat Sentinel, the company's continuous vulnerability assessment and management service for web applications. Mr. Niedzialkowski has extensive experience in web application assessment and is a key contributor to the design of WhiteHat's scanning technology."

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We're all very familiar with each of those issues. Instead, we'll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security Rresearch and developmentD and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent conference speaker at the BlackHat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites.

RadioZoom
RZ#52 – The Vancouver Canucks; Zoom-in-Tech; Language Differences

RadioZoom

Play Episode Listen Later Dec 16, 2005


[Show Notes Link]Direct Download Link | | Direct download link This episode had lots of ups and downs within its creation, but I’m not one to take something I made and not do something with it. This is going out a little later than what has been expected of me lately. I have no excuses other than just having other things in my life preoccupy my time. We start out with a little talk about the Vancouver Canucks, debut the first ever installment of Zoom In Tech, and finish up with listener email. As always, great music for you to check out, played with permission. Zoom In Tech is a segment I will do from time to time about things in the world of technology that are important to me or that I just find cool. It’s a way for me to share information with you, but I am far from an expert. It’s just another passion that I have in my life. Zoom In Tech Links: – MacMinute – Morgan Stanley expects Apple iPhone announcement – Spymac – Morgan Stanley expects iPhone in 2006 – MacNN – HBO interested in deal with Apple – MacInTouch – Sonnet Technologies introduces the Encore/ST G4 Duet 1.7 GHz – Mac Rumors – Analysts Expect Intel Macs in January – AppleInsider – Apple to tackle consumer electronics; iPod “boombox” planned – ThinkSecret – 13.3-inch iBook – ThinkSecret – media-savvy Mac mini – eWeek.com – Intel’s Napa Wireless Platform Promises More with Less – MacWorld Conference & Expo Other mentioned links for today: – Vancouver Canucks – Wikipedia: toque, tuque, beanie, canadian english – Podsafe Music Network Today’s music selections: – The GoStation – wandering away – Shiner – play dead (The Life and Times) – The Format – sore thumb – Less Than Jake – look what happened Please send an email or audio comment to radiozoom [at] gmail [dot] com. Also, send your mp3’s of music you’d like to see played on my podcast to the same address. 39:07 minutesSubscribe: RSS Podcast Feed Subscribe on iTunes © Copyright Creative Commons: Attribution-NonCommercial 4.0 International (CC BY-NC 4.0), RadioZoom (John Bollwitt)

.NET Rocks!
Showdown! Mary Jo Foley vs. Darryl Taft

.NET Rocks!

Play Episode Listen Later Jan 1, 1970 55:15


Noted journalists Mary Jo Foley and Darryl K Taft on loan from eWeek magazine are in the studio in a head to head discussion around topical issues concerning Microsoft. The gloves come off and they don't stop until there's carnage on the floor! OK, it's not that ugly, but you won't want to miss it.Support this podcast at — https://redcircle.com/net-rocks/donations