Podcast plays out security drama

Network security firm Arbor Networks is producing a podcast drama series aimed at getting business and IT professionals to take security seriously.

Network security firm Arbor Networks is producing a podcast drama series aimed at getting business and IT professionals to take security seriously.

Two pilot episodes of the 12-part series, Secure the Core, were aired over the internet earlier this week, in what is believed to be the first ever technology-focused podcast drama.

The weekly episodes aim to bring to life the impact of network security threats on businesses and feature expert commentary from Arbor.

The series centres on CSTF Financial, a credit card company that receives an e-mail demanding $5m in return for regaining control of its network. When the company dismisses the threat as a hoax, its network begins to fall apart piece by piece, and the race to nail the hacker and rescue the company's IT infrastructure begins.

A new three- to four-minute episode will be released every Tuesday.

Tina Stewart, vice-president of marketing at Arbor Networks, said, “Our Secure the Core podcast series is intended to engage a diverse audience, including decisionmakers and technologists among service provider and enterprise markets, in an entertaining way, while at the same time conveying practical, expert commentary and information that will help them best protect their networks from external and internal threats.”

To listen in to Secure the Core, visit
www.arbornetworks.com/podcasts

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close