Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Battling the Challenge of Privileged Access Management
18/04/2017A report from Editorial Director Tom Field on why organizations struggle with privileged access management leads the latest edition of the ISMG Security Report. Also, did the NSA target SWIFT bureaus?
-
'Do's and Don'ts' for Dealing with Regulators
17/04/2017What should healthcare entities and business associates expect when faced with a data breach investigation or compliance audit by federal regulators? Attorney Marti Arvin discusses the do's and don'ts.
-
Is the Internet Forever?
14/04/2017Too many businesses assume that the internet will be around forever, but that's faulty thinking and an impractical business practice, says Information Security Forum's Steve Durbin, a featured speaker at Information Security Media Group's Fraud and Breach Prevention Summit in Atlanta this month.
-
Gotcha! The Nabbing of a Criminal Skimmer
14/04/2017Leading the latest version of the ISMG Security Report: A tale of how a dedicated manager spent her weekends monitoring video of ATMs led to the capture of a criminal skimmer. Also, the growing sophistication of cybercriminals.
-
Vendors Collaborate to Share Latest Cyberthreat Intelligence
11/04/2017A look at how top security vendors share cyberthreat intelligence leads the latest edition of the ISMG Security Report. Also, states taking up legal efforts to assure the safety of medical devices and apps sold to consumers.
-
What Drives Eastern European Cybercriminals?
10/04/2017When it comes to the motivations driving Eastern European cybercriminals, "pseudo-anti-Americanism" is big, says Vitali Kremez, a researcher with intelligence firm Flashpoint who regularly infiltrates cybercrime forums.
-
New Ideas to Attract, Retain Cyber Talent
07/04/2017A report outlining new ways to recruit and retain cybersecurity professionals in the U.S. federal government leads the latest edition of the ISMG Security Report. Also, the sector considered the most cybersecurity challenged, and the growing interest in virtual private networks.
-
Insider Threat: Lesson from the Physical World
04/04/2017The latest edition of the ISMG Security Report leads off with an interview with the co-editor of a new book, Inside Threat, who uses examples from the physical world that can be applied to the virtual world. Also, organizations fall short on offering identity protection services.
-
Medical Device Cybersecurity: Progress and Gaps
03/04/2017Collaboration between medical device manufacturers and ethical hackers who discover vulnerabilities is getting better, but there's still plenty of room for improvement, says Bill Aerts, the former global privacy and security officer of Medtronic.
-
Banking and the Shifting Security Landscape
03/04/2017The security landscape has shifted significantly for financial services organizations. And now they must use digital transformation as the impetus to evolve their cybersecurity strategies, says Bruce Roton of Level 3.
-
Highlights from the Hearing on Russian Election Interference
31/03/2017Leading the latest edition of the ISMG Security Report: A breakdown of testimony presented at a Senate Select Committee on Intelligence hearing on Russia's attempt to influence the U.S. presidential election. Also, remembering Trend Micro Chief Technology Officer Raimund Genes.
-
What's in Store for HIPAA Under New OCR Leadership?
30/03/2017What's in store for health data privacy and security initiatives in the Trump administration, now that a new leader for the HHS Office for Civil Rights, which enforces HIPAA, has been selected? Healthcare attorney Kirk Nahra, a regulatory expert, offers an assessment.
-
What Motivates Targeted Attacks Today?
30/03/2017As the threat landscape evolves, with risks exposed by newer technologies and commoditization of attack infrastructure, the motives of targeted attackers may also be evolving as they try new ways to influence change in an increasingly digital world.
-
Rise of the Secure Technology Alliance
29/03/2017The former Smart Card Alliance industry group has expanded its mission to include IoT, mobility and other emerging technologies. And it has a new name, too: Secure Technology Alliance. Executive Director Randy Vanderhoof explains the move.
-
Britain's Home Secretary Enters the Encryption Debate
28/03/2017An analysis of British Home Secretary Amber Rudd's call for law enforcement to gain access to encrypted communications services, such as WhatsApp, leads the latest edition of the ISMG Security Report. Also, a preview of ISMG's Fraud and Breach Prevention Summit in San Francisco.
-
Blockchain Seen as a Secure Cyberthreat Info Sharing Tool
24/03/2017A look at experts promoting blockchain as a secure way to share cyberthreat information leads the latest edition of the ISMG Security Report. Also, how sound waves pose a threat to IoT devices, smartphones and medical devices.
-
Why Continuous Vulnerability Assessment Is Essential
24/03/2017With the rapid changes in the threat landscape and the risks introduced by DevOps, the cloud and other new elements, organizations need to have a continuous vulnerability assessment program as a security baseline, says Richard Bussiere of Tenable Network Security.
-
Moving From IT-Driven to Business-Driven Security
21/03/2017Organizations are shifting from an IT-driven to a business-driven approach to information security, with a focus on minimizing business disruption, says Kartik Shahani of RSA.
-
Comey Confirms Probe of Possible Trump-Russia Links
21/03/2017Leading the latest edition of the ISMG Security Report: FBI Director James Comey's revelation of a counterintelligence investigation of possible ties between Donald Trump's presidential campaign and Russia's actions to influence the U.S. presidential election.
-
Re-Thinking IAM and Cybersecurity
21/03/2017A recent study by Forrester Research unveils a direct correlation between data breaches and organizations' IAM immaturity. What needs to change? Corey Williams of Centrify offers strategic advice.