Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • Rallying Support for Security Investments

    07/03/2012

    Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.

  • Dissecting a Hacktivist Attack

    06/03/2012

    Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.

  • Breaches: The Top Trends

    02/03/2012

    What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.

  • Schmidt Hopeful on Bill's Passage

    01/03/2012

    White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.

  • A Framework for Vulnerability Reports

    29/02/2012

    A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.

  • How Organized Crime Uses Banks

    28/02/2012

    The U.S. Treasury is asking banking institutions to play a more active role in the fight against organized crime. Fraud experts at Ernst & Young share what the Treasury's new demands mean for future investments banks have to make.

  • Cyber Attacks: Not If or When, But Now

    27/02/2012

    No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.

  • What to Expect at RSA Conference

    23/02/2012

    This is the first RSA Conference since 2011's high-profile security breaches. How did those incidents influence this year's agenda? Hugh Thompson explains in an exclusive event preview.

  • Mobile Security: Enabling BYOD

    22/02/2012

    Mobile security is a new discussion track at RSA Conference, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses BYOD and how organizations are securing personally-owned devices.

  • The Book on Insider Threats

    21/02/2012

    The insider threat: It's a top challenge for any organization, and it's a hot topic for RSA Conference attendees. Dawn Cappelli and Randy Trzeciak preview their new book, The CERT Guide to Insider Threats.

  • Putting to Rest RSA Key Security Worries

    20/02/2012

    IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.

  • Lax Breach Laws Endanger Businesses

    20/02/2012

    Data breaches are under-reported, and breached organizations aren't giving consumers the information they need about these compromises, says Karen Barney of the Identity Theft Resource Center.

  • Sizing Up Impact of Class Action Suits

    20/02/2012

    High-profile class action lawsuits filed in the wake of major health information breaches will prove to be a strong catalyst for ramped up data security, a panel of attorneys says.

  • The CISO Challenge

    18/02/2012

    Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.

  • Breach Response: Initiate Forensic Probe

    17/02/2012

    Getting forensics help should be one of the first steps an organization takes after a breach occurs, says IT security and privacy lawyer Miriam Wugmeister.

  • Fraud Fight: How to Pick Your Battles

    15/02/2012

    From mobile malware to the Anonymous hacktivist attacks, how can organizations tackle the changing threat landscape? In an RSA Conference preview, Joe Rogalski of First Niagara Bank shares ideas.

  • Fraud: The Latest Threats

    15/02/2012

    What are the top emerging fraud threats via mobile banking, and how must security leaders respond? In an RSA Conference preview, Julie McNelley of the Aite Group offers tips for fighting the newest threats.

  • NIST to Unveil Controls Guidance at RSA

    15/02/2012

    NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.

  • Fraud: The Latest Threats

    15/02/2012

    What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.

  • Healthcare Breaches: Behind the Numbers

    03/02/2012

    Healthcare breach statistics reflect an unfortunate trend: "IT security has not really kept pace with the progress that's been made in the adoption of electronic health records," says Dan Berger, CEO of Redspin.

página 138 de 145