Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Cloud Computing: A Case Study
15/04/2011Altra Federal Credit Union developed a calculated strategy before moving to the cloud -- advice all financial institutions should follow, says Brian Boettcher, VP of IT, who shares his lessons learned.
-
Epsilon Breach: Time to 'Come Clean'
06/04/2011When it comes to e-marketing and the reliance on third parties such as Epsilon, Nicolas Christin of Carnegie Mellon University says banks and merchants should "come clean" about the information they share with outside entities.
-
Epsilon Breach: Risks and Lessons
05/04/2011Privacy Attorney Lisa Sotto says the Epsilon e-mail breach is a warning about the state of data security employed by some third-party service providers. Strong contracts related to security practices must be the norm, not the exception.
-
RSA Breach: A CISO's Action Items
25/03/2011Terrell Herzig, CISO at UAB Medicine, speaks out on steps steps he's taking in the wake of the RSA SecurID attack.
-
RSA Breach: Customer's Perspective
22/03/2011Marcus Ranum isn't just a well-regarded information security expert. He's also a customer of the RSA SecurID product, and he's got some strong feelings about the RSA breach and how the industry has responded to it.
-
Special Report: The RSA Breach and its Impact
18/03/2011The announcement by RSA that it had been a victim of an advanced persistent threat shook the global information security industry. Stephen Northcutt of SANS Institute and David Navetta of the Information Law Group offer insight on what happened, what it means and how to respond.
-
RSA Breach: 'Not a Game-Changer'
18/03/2011It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But "It's not a game-changer," says Stephen Northcutt, CEO of SANS Institute. "Anybody who says it is [a game-changer] is an alarmist."
-
Legal View of RSA Breach
18/03/2011"Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.
-
5 Tips for Securing SmartPhones
18/03/2011Smartphones are ubiquitous in organizations today. But how secure are these devices -- and what are the security and liability vulnerabilities associated with their use?
-
Australia: Cyber Crime Fight
16/03/2011Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.
-
Breach Notification and National Security
08/03/2011Today's technology is not adequately used, says attorney Lucy Thomson.
-
Patrick Bedwell
05/03/2011Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.
-
Overlooked Breach Prevention Steps
28/02/2011Terrell Herzig, information security officer at UAB Medicine, pinpoints frequently overlooked breach prevention steps.
-
Cybersecurity: Firewalls Are Easy to Pierce
15/02/2011The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.
-
Shifting to Hardware-Based Encryption
14/02/2011Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
-
Five HIPAA Compliance Tips
11/02/2011Security expert Raj Chaudhary offers five tips for keeping health information private.
-
Breach Disclosure: New Laws, Higher Standard
03/02/2011Wells Fargo's Alexander says breach disclosure laws are getting tougher.
-
The ROI of Security Compliance
31/01/2011Tripwire's Shenoy says security compliance improves the bottom-line.
-
Selecting a Data Loss Prevention App
27/01/2011Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.
-
The 'Human Side' of EHR Security
21/01/2011Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.