Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • The Impact of Bit9, Carbon Black Merger

    25/02/2014

    The recent merger of Bit9 and Carbon Black will eventually result in a single, merged product offering, says Benjamin Johnson, CTO at Carbon Black.

  • CipherCloud Unveils New Platform

    25/02/2014

    CipherCloud's Paige Leidig discusses a new offering that helps enable organizations rapidly adopt a cloud application as it protects sensitive data and ensures compliance to policies and regulations.

  • Securing Network Architecture

    25/02/2014

    Although the growth of cloud-based data centers offers opportunities to more rapidly deploy applications, it also raises new security issues, says Steve Pao, senior vice president at Barracuda Networks.

  • Cryptocurrency an Easy Target

    25/02/2014

    Researchers at Dell SecureWorks have identified some 146 unique malware families that are targeting cryptocurrencies. Approximately 100 of those have emerged in just the last year, says Pat Litke, security analysis adviser for the company's CyberThreat unit.

  • Log Analysis for Breach Prevention

    25/02/2014

    Log analysis is often used for managed security, but are organizations going far enough with the information they have at their fingertips? Don Gray, chief security strategist for Solutionary, says there is much more organizations could be doing to predict breaches.

  • Advanced Threat Defense

    24/02/2014

    Advanced, ever-evolving threats call for security solutions vendors to counter with equally advanced and sophisticated solutions. JD Sherry of Trend Micro discusses new strategic alliances and product sets dedicated to creating new measures of threat defense.

  • 2014 Fraud Prevention: 2 Key Steps

    22/02/2014

    Two critical steps that banking institutions need to take in 2014 to help prevent fraud are implementing big data analytics and adopting far more sophisticated customer and employee authentication, says Gartner analyst Avivah Litan.

  • HSBC Requires Dual Authentication

    20/02/2014

    In a groundbreaking effort to boost security, HSBC Bank USA is now requiring its retail banking customers to use dual-factor authentication for certain sensitive online banking transactions, says LuAnne Kingston, senior vice president.

  • Securing the Smart Grid

    20/02/2014

    Distributed generation and plug-in motor vehicles are among the emerging security challenges to the smart grid. In an RSA 2014 preview, Gib Sorebo of Leidos discusses the threats to utilities and consumers.

  • InfoSec Investments: Venture Capital's View

    18/02/2014

    What is the venture capital view of the security trends and technologies that will have the most impact on careers in 2014? Alberto Yépez of Trident Capital weighs in with his insights and predictions.

  • An EMV Pioneer Offers Lessons Learned

    17/02/2014

    Merrill Halpern of the United Nations Federal Credit Union, a pioneer in the use of chip cards, says high-profile retail breaches reinforce the long-term value of EMV for various forms of payment within the U.S.

  • Breaches: Avoiding Legal Woes

    17/02/2014

    Healthcare organizations can take several key steps to help avoid the scrutiny of their state's attorney general and defend against possible class action lawsuits in the aftermath of data breaches, says privacy attorney David Navetta.

  • Baking Privacy Into Health IT

    12/02/2014

    Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014. Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."

  • Target Breach: The Cost to Banks

    12/02/2014

    Expenses linked to the data breach at Target Corp. have already cost the 58 member institutions of the Consumer Bankers Association more than $170 million - a price they should not have to pay, says the association's David Pommerehn.

  • Building a 'One-Shot' Memory Device

    12/02/2014

    Employing quantum physics, Yi-Kai Liu, a computer scientist at the National Institute of Standards and Technology, is attempting to devise a way to create a one-shot memory device that could help secure transactions or administrative passwords.

  • 5 Ways to Improve PCI Compliance

    11/02/2014

    Organizations in all sectors can improve their compliance with the PCI Data Security Standard by taking five critical steps, says Rodolphe Simonetti of Verizon Enterprise Solutions, which just issued a new PCI compliance report.

  • Stopping Laptop Breaches: Key Steps

    11/02/2014

    The ongoing epidemic of health data breaches involving unencrypted laptops demonstrates why many healthcare organizations need to conduct more meaningful risk assessments, says security expert Dan Berger.

  • Card Breaches Pose Greatest Fraud Risk

    07/02/2014

    A new identity fraud study shows that consumers who are victims of a payment card breach are at greater risk of fraud than victims of other types of breaches, says Al Pascual of Javelin.

  • Compensating Banks for Breaches

    06/02/2014

    When breaches result from retailers' lax security practices, merchants should be obligated to help banking institutions cover fraud losses and other post-breach expenses, says Viveca Ware of the Independent Community Bankers of America.

  • RSA 2014: A Preview

    04/02/2014

    Expanded with more educational tracks and sessions on emerging hot topics, the 2014 edition of the RSA Conference will be the largest ever, says Hugh Thompson, program committee chair.

página 120 de 145