Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
IAM and Improving the Customer Experience
06/06/2014Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
-
Stop Breaches? Improve Internet Hygiene
05/06/2014Poor Internet hygiene, not increased cybercrime, is what's really to blame for the increased botnet traffic the online world is battling, say cybersecurity experts Tom Kellermann and Rod Rasmussen.
-
Keeping Up with Cybersecurity Framework
30/05/2014The folks at PricewaterhouseCoopers, after surveying 500 U.S. business, law enforcement and government executives, conclude that the vast majority of cybersecurity programs fall very short of the federal government's cybersecurity framework goals.
-
Thwarting Cybercrime in Healthcare
27/05/2014Healthcare organizations are becoming a bigger target for cybercriminals because so much more clinical and financial information is now stored in potentially vulnerable information systems, says security expert Mac McMillan.
-
Target's Impact on Mobile Payments
21/05/2014High-profile retail breaches, such as the one suffered by Target Corp., could spur more merchants to promote increased use of mobile payments to boost security, says Thad Peterson, a new analyst at Aite Group.
-
Fighting the Synthetic ID Threat
19/05/2014Fighting fraud tied to synthetic identities requires revamping the credit infrastructure to improve detection of fraudsters' activities, says risk management specialist Richard Parry.
-
Getting CISO, CEO to Talk Same Language
19/05/2014What does "IT security as a business enabler" mean? For a definition, Gartner's Paul Proctor looks to the way IT managers at a European car maker translate security problems into a language a CEO can understand.
-
Avivah Litan on 'Context-Aware' Security
15/05/2014A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
-
A New Way to Build Security Awareness
13/05/2014Embedding some information security practitioners within business units could help improve IT security awareness in many enterprises, reducing security risk, says Steve Durbin, global vice president of the Information Security Forum.
-
Getting Up to Speed on Security
09/05/2014Timely analysis of data residing in an organization's information systems is a critical element of IT security, say Haiyan Song and Joe Goldberg of the security firm Splunk.
-
The Evolution of the Cybercriminal
09/05/2014Today's cybercriminals are perfecting the use of advanced-persistent-threat attacks to pilfer valuable information from precisely targeted victims, says Greg Day of security provider FireEye.
-
In Defense of Cybersecurity Framework
08/05/2014A leader of ISACA, Sarb Sembhi, defends President Obama's cybersecurity framework, which critics contend lacks sophistication. He says detractors miss the point about how frameworks evolve.
-
BYOD: Building an Effective Strategy
06/05/2014Too many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch.
-
Mobile File Sharing Trends
06/05/2014As members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy.
-
Ponemon: Data Breach Costs Rising
06/05/2014On the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response.
-
Fighting Threats with Behavioral Analysis
05/05/2014A behavioral analysis approach to fighting malware can be more effective than a signature-based approach in the current threat environment, contends Webroot's Patrick Kennedy.
-
The Next Generation of Encryption
05/05/2014Voltage Security's Mark Bower contends data-centric security can help break down barriers to the widespread use of encryption and help protect sensitive information, including credit card numbers.
-
Using Network 'Situational Awareness'
05/05/2014Network "situational awareness" can help organizations in all business sectors improve regulatory compliance by identifying networks and devices that need protection, says Lumeta's Reggie Best.
-
Cybersecurity: Taking an Economic View
02/05/2014Hurt the criminals and cyberthreats will decrease. That's how organizations in all sectors, working with law enforcement, should approach cybersecurity, says Juniper Networks' Kevin Kennedy.
-
Authentication and the Individual
02/05/2014Individuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service.