Data Breach Today Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • Securing Data Via Containerization

    01/02/2013

    Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.

  • Continuous Monitoring and the Cloud

    25/01/2013

    As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.

  • CISOs Reveal Top Threat Worries

    22/01/2013

    It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.

  • ENISA Identifies Top Cyberthreats

    21/01/2013

    ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?

  • The Evolution of Incident Response

    14/01/2013

    It isn't so much the changing threat landscape that causes security leaders to re-assess their approach to incident response. Mobility and the expanding perimeter are the real factors driving change.

  • VanRoekel on Infosec and Sequestration

    14/01/2013

    With Congress facing $1.2 trillion in budget cuts, Federal Chief Information Officer Steven VanRoekel says funding for cybersecurity initiatives will likely be affected. But with smart planning, government information technology should not be placed at risk.

  • How to Keep Mobile Health Data Secure

    10/01/2013

    Kathryn Marchesini, a privacy adviser at the Office of the National Coordinator for Health IT, outlines the three most important steps healthcare organizations should take to avoid breaches of information on mobile devices.

  • ID Theft: 2013 Top Trends

    10/01/2013

    ID theft is a growing global problem. Eva Velasquez, head of the ITRC, outlines how public and private organizations in 2013 can update approaches to ID theft prevention.

  • FS-ISAC on DDoS, Account Takeover

    09/01/2013

    Which fraud trends need the most attention from U.S. banking institutions in 2013? Distributed-denial-of-service attacks and account takeover, says FS-ISAC's Bill Nelson, who offers fraud-fighting tips.

  • Educational Value of Competition

    09/01/2013

    Does cyber defense competition help prepare college students for real-world jobs in information security and risk management? Dan Likarish and Rick Cisneros of Regis University say yes. Here's why.

  • Tom Ridge on DHS's IT Security Role

    08/01/2013

    Tom Ridge, the first Homeland Security secretary, questions the wisdom of granting the Department of Homeland Security greater authority to influence IT security within the federal government and the nation's critical IT infrastructure.

  • Hanging Tough with Int'l Privacy Regs

    04/01/2013

    With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.

  • Account Takeover: The 2013 Outlook

    03/01/2013

    What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters.

  • 2012's Top Breaches & Lessons Learned

    27/12/2012

    From Global Payments to LinkedIn and Zappos, 2012 was filled with notable data breaches. What were the most significant breaches, and how should they influence organizations' breach responses in 2013?

  • How to Address Security's Weakest Link

    24/12/2012

    Heading into 2013, security leaders across industry feel confident about their processes and technology. People, though, continue to create the greatest risks. Can "awareness in depth" make a difference?

  • Top 3 Security Priorities for 2013

    21/12/2012

    CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?

  • Why It's Time for Next-Gen Firewall

    20/12/2012

    Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.

  • 2013 Mobile Security, Payments Outlook

    19/12/2012

    When it comes to mobile security, users say the right things, but still indulge in risky behavior. Javelin's Al Pascual tells how security leaders can create better partnerships and practices in 2013.

  • How a Breach Led to Change in Culture

    18/12/2012

    A breach that resulted in a $1 million HIPAA settlement led Partners Healthcare in Boston to take many significant steps, including merging its privacy and security efforts, says CISO Jennings Aske. More changes are planned for 2013.

  • Banks Must Brace for 'Blitzkrieg' Attacks

    14/12/2012

    McAfee researchers have uncovered new information about a Gozi variant, which RSA in October named Prinimalka. The Trojan, part of a blitzkrieg-like attack, is expected to hit 30 institutions in spring 2013.

página 126 de 139