Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • ID Fraud Drops for First Time Since 2010

    06/03/2015

    ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater.

  • Mega-Breaches: Notification Lessons

    05/03/2015

    Massive breaches, such as the recent hacker attack on health insurer Anthem, highlight why it's important for organizations to understand their breach notification obligations under state laws as well as HIPAA, says attorney Brad Rostolsky.

  • Bit9 CEO on Data Breach Defense

    05/03/2015

    The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.

  • When Fraud and Security Converge

    02/03/2015

    Financial crimes, fraud and cybersecurity. These topics are quickly converging upon security organizations, and leaders must be prepared. FICO's Stuart Wells discusses the tools and skills needed for convergence.

  • What is Gov't Role in Info Sharing?

    27/02/2015

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James.

  • Why Hide Cyber Skirmishes With Iran?

    25/02/2015

    Were DDoS attacks against major American banks in 2012 waged in retribution for U.S. government actions? A recently leaked top-secret memo prepared in 2013 for Keith Alexander, who was then NSA director, seems to confirm that's the case.

  • Four Steps for Securing Medical Devices

    23/02/2015

    As new cyberthreats emerge, medical device maker Philips Healthcare is implementing a four-prong strategy for ensuring the cybersecurity of its products. Michael McNeil, global product security and services officer, outlines the steps.

  • India's Hackers Come of Age

    23/02/2015

    With white-hat security researchers gaining increasing mainstream recognition, hacking as a vocation is no longer taboo - and Indian researchers are flocking to the profession, says HackerOne's Katie Moussouris

  • Understanding the Hacker Mindset

    20/02/2015

    Learning more about potential attackers and their preferred information targets is one of the best ways organizations can mitigate their cyber-attack risks, says Bank of the West's David Pollino, a featured speaker at ISMG's Fraud Summit LA.

  • The New Approach to DDoS Protection

    19/02/2015

    Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.

  • New Details About $1 Billion Crime Ring

    17/02/2015

    In an exclusive interview, Sergey Golonvanov, a threat researcher at Kaspersky Lab, offers insights about the Russian cybercrime ring that over the weekend made headlines for defrauding banks of up to $1 billion.

  • Inside Cisco's Annual Security Report

    16/02/2015

    The volume of spam messaging is down, but the bogus messages that are getting through? They're more malicious than ever, says Cisco's Jason Brvenik. He shares insights from Cisco's 2015 Security Report.

  • 'CIO of Year' on Defending Against Hackers

    13/02/2015

    What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers.

  • Raduege: Why New Cyber Agency Matters

    12/02/2015

    A new federal cyberthreat intelligence center could help the government build more resilient networks and better identify cyber-attackers, leading to arrests and punishments, says Harry Raduege, a former top Defense Department IT leader.

  • Phishing: Learning from Recent Breaches

    12/02/2015

    The Anthem breach, which possibly started with a phishing campaign, is a prime example of how hackers are perfecting their schemes to target key employees who have access to valued information, says Dave Jevans of the Anti-Phishing Working Group.

  • Why 'Adaptive Defense' Is Critical

    12/02/2015

    As hack attacks, such as the breach of Anthem Inc., become more common, it's more critical than ever for organizations to carry out an "adaptive defense model" to protect sensitive information, says Dave Merkel, chief technology officer at FireEye.

  • Can PINs Reduce Online Fraud?

    10/02/2015

    PINS can effectively reduce card-not-present as well as card-present fraud, argues Liz Garner of the Merchant Advisory Group, who will be a featured speaker at Information Security Media Group's upcoming Fraud Summit Los Angeles.

  • Improving Cyberthreat Intelligence

    10/02/2015

    Technologies that allow companies to analyze cyberthreats are evolving and soon should provide better intelligence to mitigate attacks, says Jim Anderson, a president at BAE Systems Applied Intelligence.

  • Risk Management Lessons from Anthem Hack

    06/02/2015

    The recent cyber-attack on health insurer Anthem Inc. is a "call to action" for the healthcare sector to adopt a much more sophisticated approach to risk management, says security expert Lisa Gallagher of HIMSS.

  • Security Program: Elements of Success

    06/02/2015

    There is no such thing as 100 percent security, so what does a truly successful security program look like? Mike Gentile of Auxilio describes the key elements of a formal program and how best to deploy them.

página 109 de 145