Informações:
Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Securing Data Via Containerization
01/02/2013Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
-
Continuous Monitoring and the Cloud
25/01/2013As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
-
CISOs Reveal Top Threat Worries
22/01/2013It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.
-
ENISA Identifies Top Cyberthreats
21/01/2013ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
-
The Evolution of Incident Response
14/01/2013It isn't so much the changing threat landscape that causes security leaders to re-assess their approach to incident response. Mobility and the expanding perimeter are the real factors driving change.
-
VanRoekel on Infosec and Sequestration
14/01/2013With Congress facing $1.2 trillion in budget cuts, Federal Chief Information Officer Steven VanRoekel says funding for cybersecurity initiatives will likely be affected. But with smart planning, government information technology should not be placed at risk.
-
How to Keep Mobile Health Data Secure
10/01/2013Kathryn Marchesini, a privacy adviser at the Office of the National Coordinator for Health IT, outlines the three most important steps healthcare organizations should take to avoid breaches of information on mobile devices.
-
ID Theft: 2013 Top Trends
10/01/2013ID theft is a growing global problem. Eva Velasquez, head of the ITRC, outlines how public and private organizations in 2013 can update approaches to ID theft prevention.
-
FS-ISAC on DDoS, Account Takeover
09/01/2013Which fraud trends need the most attention from U.S. banking institutions in 2013? Distributed-denial-of-service attacks and account takeover, says FS-ISAC's Bill Nelson, who offers fraud-fighting tips.
-
Educational Value of Competition
09/01/2013Does cyber defense competition help prepare college students for real-world jobs in information security and risk management? Dan Likarish and Rick Cisneros of Regis University say yes. Here's why.
-
Tom Ridge on DHS's IT Security Role
08/01/2013Tom Ridge, the first Homeland Security secretary, questions the wisdom of granting the Department of Homeland Security greater authority to influence IT security within the federal government and the nation's critical IT infrastructure.
-
Hanging Tough with Int'l Privacy Regs
04/01/2013With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.
-
Account Takeover: The 2013 Outlook
03/01/2013What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters.
-
2012's Top Breaches & Lessons Learned
27/12/2012From Global Payments to LinkedIn and Zappos, 2012 was filled with notable data breaches. What were the most significant breaches, and how should they influence organizations' breach responses in 2013?
-
How to Address Security's Weakest Link
24/12/2012Heading into 2013, security leaders across industry feel confident about their processes and technology. People, though, continue to create the greatest risks. Can "awareness in depth" make a difference?
-
Top 3 Security Priorities for 2013
21/12/2012CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
-
Why It's Time for Next-Gen Firewall
20/12/2012Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
-
2013 Mobile Security, Payments Outlook
19/12/2012When it comes to mobile security, users say the right things, but still indulge in risky behavior. Javelin's Al Pascual tells how security leaders can create better partnerships and practices in 2013.
-
How a Breach Led to Change in Culture
18/12/2012A breach that resulted in a $1 million HIPAA settlement led Partners Healthcare in Boston to take many significant steps, including merging its privacy and security efforts, says CISO Jennings Aske. More changes are planned for 2013.
-
Banks Must Brace for 'Blitzkrieg' Attacks
14/12/2012McAfee researchers have uncovered new information about a Gozi variant, which RSA in October named Prinimalka. The Trojan, part of a blitzkrieg-like attack, is expected to hit 30 institutions in spring 2013.