Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Web Based Attack Trends and How to Leverage Information Sharing
26/12/2014Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
-
Staffing Crisis: What India Can Do
26/12/2014Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)².
-
Sony Hack Breaks 'Nation-State' Mold
23/12/2014While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
-
ZixCorp CEO on E-mail Security Evolution
22/12/2014Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
-
ForeScout CEO on Internet of Things
17/12/2014As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
-
Proofpoint's CEO: Hackers Are Winning
15/12/2014Gary Steele has seen attack methods rapidly evolve over the last five years. But what the CEO of Proofpoint hasn't seen is a comparable evolution in how the security industry responds to attacks.
-
AirWatch Chairman on Mobile Security
12/12/2014Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.
-
The True Cost of a Data Breach
08/12/2014When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
-
Christy Wyatt on Mobile Security
04/12/2014Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
-
'Wiper' Malware: What You Need to Know
03/12/2014Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
-
Why Merchants Embrace Tokenization
01/12/2014Retailers say tokenization and encryption are critical to ensuring payment card data security. Aite's Natalie Reinelt describes how merchants will use layers of security to protect data at the point of capture.
-
2015 Trend: Big Data for Threat Analysis
26/11/2014The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.
-
A Boost for Cybersecurity Policy Analysis
26/11/2014Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.
-
Security Staffing: The Real Crisis
26/11/2014Yes, there is a global security staffing shortage. But what is the cause, and what can be done to address the crisis? Hord Tipton of (ISC)² offers his take on key issues facing the profession.
-
Embracing the Adversary Mindset
20/11/2014Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
-
How IBM Will Grow Its Security Business
17/11/2014Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.
-
FireEye CEO: The Evolution of Security
12/11/2014The threats, the solutions and certainly the actors all have changed dramatically since David DeWalt first entered the information security industry. Which should be the top concern for enterprises?
-
David DeWalt: The Business of Security
12/11/2014Advanced threats, targeted attacks and enterprise mobility have re-shaped how we approach security, and they've also influenced the growth of FireEye. CEO David DeWalt discusses the highs and lows of his tenure.
-
The Business of Fighting Fraud
12/11/2014The cost of cyberfraud is expected to hit $8 billion by 2018, and that increase opens new doors for solutions provided by niche cybersecurity firms, says Easy Solutions CEO Ricardo Villadiego.
-
Fiberlink President on Future of BYOD
12/11/2014BYOD is evolving into the "BYO-everything" trend, says Chris Clark, president of IBM's Fiberlink. He discusses Apple and IBM's enterprise mobility deal, as well as how mobility continues to reshape computing.