Data Breach Today Podcast



Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders


  • Applying Critical, Systems and Design Thinking to Security


    Brian Barnier, a director of analytics who is developing a course on critical and design thinking in cybersecurity for, is a firm believer in the importance of critical thinking today. He discusses how that, plus systems and design thinking, can improve the way cybersecurity functions.

  • Ransomware Updates: Conti Attacks Rise, New Players Surface


    The latest edition of the ISMG Security Report features an analysis of how the U.S. government has been tracking an increase in the pace of attacks tied to Conti ransomware. Also featured are what "protection" means today and building a new cybersecurity operating model.

  • Facilitating the Secure Exchange of Health Data


    The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.

  • Is White House Crackdown on Ransomware Having Any Effect?


    The latest edition of the ISMG Security Report features an analysis of the state of the Biden administration's efforts to disrupt ransomware attackers, as well as how a newly patched Apple iMessage flaw was being targeted by Pegasus spyware to effect zero-click exploits.

  • Ransomware: Hot or Not? Here's Attackers' Ideal Target


    The latest edition of the ISMG Security Report features an analysis of the most sought-after type of victim for ransomware-wielding attackers. Also featured: fighting extortion schemes and stress management tips.

  • Navigating the New Internet Attack Surface


    It’s the largest attack surface in history, and adversaries are taking advantage by launching attacks at an unprecedented volume and velocity. Shashi Prakash of Bolster discusses how to monitor and manage this new and shifting range.

  • How Infusion Pump Security Flaws Can Mess with Drug Dosing


    Several security vulnerabilities in infusion pump products from B. Braun could collectively allow malicious actors to modify the dose of medicines delivered to patients, says Douglas McKee, a security researcher on a McAfee Enterprise team that recently discovered the flaws.

  • Analysis: The Latest Data Breach Trends


    The latest edition of the ISMG Security Report features an analysis of data breach trends. Also featured: yet another Microsoft Exchange vulnerability and misconceptions about cybercrime groups.

  • Wait, Watch, Disrupt: How Police Keep Targeting Cybercrime


    Because a relatively small number of individuals provide the vast majority of services and infrastructure that power cybercrime, they remain top targets for arrest - or at least disruption - by law enforcement authorities, says cybercrime expert Alan Woodward. But of course, geopolitics sometimes gets in the way.

  • Analysis: New White House Security Initiatives


    This edition of the ISMG Security Report features an analysis initiatives unveiled by the Biden administration to enhance supply chain and critical infrastructure security and address the cybersecurity skills gap. Also featured: LockBit 2.0 ransomware rep 'tells all'; misconfigured Microsoft Power Apps.

  • Andy Jenkinson of CIP: 'Shut the Digital Doors'


    Andy Jenkinson of Cybersec Innovation Partners has found an alarming number of flaws and misconfigurations in websites and web servers run by some of the biggest players in government, healthcare and even cybersecurity. He discusses this pressing issue in the latest episode of "Cybersecurity Unplugged."

  • Analysis: Disrupting the Cybercrime-as-a-Service Model


    The latest edition of the ISMG Security Report features an analysis of the cybercrime-as-a-service model and how law enforcement could potentially disrupt it. Also featured: T-Mobile probes a massive data breach; tackling abuse in the workplace.

  • Analysis: Self-Driving Tractors at Risk of Being Hacked


    This edition of the ISMG Security Report offers an analysis of how tractors manufactured by John Deere are at risk of being hacked. Also featured: a description of the infrastructure bill passed by the Senate that would boost cybersecurity funding and an update on the reboot of the AlphaBay darknet market.

  • Ongoing Issues With Security, Privacy, Complexity


    Rebecca Herold, host of the podcast show "Data Security and Privacy with the Privacy Professor," weighs in on the state of cybersecurity and privacy education and gives her recommendations on how to remedy the many issues the security community faces today.

  • Analysis: Oh, the Lies Ransomware Operators Tell


    The latest edition of the ISMG Security Report features an analysis of how ransomware attackers share about their inclinations, motivations and tactics. Also featured: The rise of integrity attacks; dispelling vaccine myths.

  • Autonomous Real-Time Patching and Penetration Testing


    David Brumley, CEO of ForAllSecure, is the creator of Mayhem, a machine that applies patching and continuous penetration testing autonomously and in real time. He discusses software flaw detection and more in this episode of "Cybersecurity Unplugged."

  • Analysis: Keeping Track of Ransomware Gangs


    The latest edition of the ISMG Security Report features an analysis of the disappearance of ransomware-as-a-service groups, such as REvil and Darkside, and how that impacts the wider cybercrime ecosystem. Also featured: ransomware recovery tips; regulating cyber surveillance tools.

  • Cybersecurity's Impact on the Global Economy


    Macroeconomist Katheryn "Kadee" Russ analyzes how the deployment of 5G networks and technologies will lead to a change in the growth of the digital economy and digital trade.

  • Waging a War on Cybercrime With Big Data and AI


    Some 95% of today’s compromises are either zero-day exploits or malware-free attacks; that means that signature-based behavioral defenses only work for 5% of attacks, says Joe Head of Intrusion Inc. He discusses how to use massive lists of historical data to train AI to spot and stop malicious activity.

  • Alert for Ransomware Attack Victims: Here's How to Respond


    As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.

página 3 de 124