Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • How to Address BYOD

    13/06/2012

    The bring-your-own-device trend is a huge issue for organizations today, says Rob Ayoub of Fortinet, who offers recommendations to address the security challenges involved.

  • Top Risk Concerns

    13/06/2012

    What are the top GRC concerns within organizations? John Ambra of Modulo explains.

  • Using Mobile to Authenticate

    13/06/2012

    Organizations looking to leverage multi-factor authentication should consider mobile devices for their unique capabilities, says Sarah Fender of PhoneFactor.

  • The Move to Data-Centric Security

    13/06/2012

    The attack space is changing, with more enterprise users accessing data from their mobile device, leading to a new focus on data-centric security, says Jeremy Stieglitz of Voltage Security.

  • A Rise in Encryption?

    13/06/2012

    A dramatic reduction in processing requirements for encryption may mean increased utilization of the technology, says Todd Thiemann of Vormetric.

  • Lessons from LinkedIn Breach

    12/06/2012

    In the wake of the LinkedIn breach, what steps should organizations take to enhance online password protection? Araxid's Brent Williams offers advice.

  • Five Application Security Tips

    30/05/2012

    Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.

  • How to Respond to Hacktivism

    23/05/2012

    Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?

  • Intelligent Defense Against Intruders

    23/05/2012

    Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.

  • 4 Security Priorities for Banks

    18/05/2012

    From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.

  • Understanding 'Big Data'

    16/05/2012

    Banks have a lot of data, but how well is it integrated? How much are institutions gleaning from the data they house? State Street Corp's chief scientist says financial services could be doing more.

  • Improving Breach Investigations

    11/05/2012

    When breaches occur, most organizations struggle to collect the right data and get investigations off the ground. How can breach response improve? Verizon's Chris Novak offers expert advice.

  • Risk of Insider Fraud

    10/05/2012

    Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.

  • How to Spot a Fraudster

    09/05/2012

    Who is more likely to commit fraud in your organization - the newly-hired youngster or the long-tenured veteran? The ACFE's new 2012 Global Fraud Study profiles the top fraudsters and their schemes.

  • Americans Less Jittery About Net Security

    09/05/2012

    Americans express a bit less anxiety about their security than they felt a year ago, perhaps because they've become desensitized by extensive news reports about cyberattacks last spring, says Unisys' Steve Vinsik.

  • The Hidden Costs of Fraud

    07/05/2012

    Dollars lost of fraud are one measure of an incident's impact. But the "soft" costs - loss of reputation and productivity - are the ones that most get the attention of Terry Austin of Guardian Analytics.

  • Social Engineering: The Next Generation

    03/05/2012

    Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.

  • Teaming Up to Fight ACH Fraud

    02/05/2012

    When it comes to curbing ACH fraud, banking regulators and law enforcement agencies have joined forces to keep institutions abreast of emerging best-practices. What are their top recommendations?

  • The Anti-Fraud Evolution

    27/04/2012

    When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?

  • Identifying Undetected Breaches

    20/04/2012

    Eighty-five percent of data breaches go undetected, but organizations have a new type of cop on the beat to ferret out these illicit activities - the data scientist, says Phil Neray, head of security intelligence strategy and marketing for Q1 Labs, an IBM company.

página 136 de 145