Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Symantec's CISO on Security Leadership
03/08/2012Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
-
Cybersecurity Act Fails; What Next?
03/08/2012Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.
-
Eddie Schwartz on His Year as RSA's CISO
23/07/2012The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.
-
Phishing Update: 'No Brand is Safe'
23/07/2012The number of phishing sites is at an all-time high. And so are the targeted brands. The message, says Peter Cassidy of the Anti-Phishing Working Group: "No brand is safe."
-
When Breach Planning Fails
20/07/2012When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
-
CISO Success Requires Collaboration
19/07/2012RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
-
Breached Organizations Are Tight-Lipped
17/07/2012Too many organizations that experience a data breach fail to reveal information on the cause of the incident so that consumers can take appropriate action, one consumer advocacy group contends.
-
High Roller: How to Protect Accounts
17/07/2012The so-called High Roller cyberattack uses automation to drain high-value bank accounts. What can institutions do to protect customers? Chris Silveira of Guardian Analytics offers advice.
-
Zeus: How to Fight Back
06/07/2012The Zeus Trojan is frightening because of its agility, evolution and success at stealing banking credentials. How can institutions fight back? Malware expert Andreas Baumhof offers new ideas.
-
Wire Fraud Settlement: The Legal Implications
27/06/2012The recent settlement between Village View Escrow and Professional Business Bank could set a new course for legal disputes involving account takeover, say the attorneys involved in the fraud case.
-
Practical Approach to Security
27/06/2012The UK Information Commissioner's Office has released a new security guide for small and midsized businesses. Simon Rice of the ICO discusses the guide and how to use it to avoid being breached.
-
Protection from Online Risks
19/06/2012June has been declared National Internet Safety Month. What is the mission behind the designation, and how can individuals and organizations contribute to the "Stop, Think, Connect" campaign?
-
Creating a Malware Intel Sharing System
14/06/2012Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.
-
The BYOD Challenge
13/06/2012What are the top challenges with the bring-your-own-device trend? Stephen Midgley, vice president of global marketing at Absolute Software, says the top issue is organizations not knowing where their data is located.
-
Mitigating Mobile Risks
13/06/2012As BYOD continues to become more commonplace, mobile application risk management aids in identifying the risks on those devices and implementing policy to protect enterprise data, says Domingo Guerra, president and founder of Appthority.
-
Improving Identity and Access Management
13/06/2012What are the top concerns around identity and access management within organizations? Avatier Chief Innovation Officer Ryan Ward says compliance, governance and audit issues are top-of-mind.
-
Using Business-Driven IAM to Improve Security
13/06/2012What is business-driven identity and access management and how can it help organizations improve their security? Jason Garbis of Aveksa explains.
-
Addressing Cloud in Government
13/06/2012What's top of mind for the federal government when it comes to cloud security? David Berman of Centrify explains.
-
Getting BYOD Advice
13/06/2012What are the top bring-your-own-device concerns enterprises are facing today? Russell Rice of Cisco explains.
-
Mitigating Advanced Cyber-Attacks
13/06/2012Cyber-attacks are becoming increasingly difficult for organizations to defend against, says Ashar Aziz of FireEye.