Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Study: Some Mobile Devices Can Be Hacked Using Sound Waves
20/03/2017Some medical devices, smartphones and internet of things gadgets contain certain types of sensors that are vulnerable to potential hacking using sound waves, says cybersecurity researcher Kevin Fu, who calls on manufacturers to address the risks.
-
Trump Budget: $1.5 Billion for DHS Cybersecurity
17/03/2017A look at President Donald Trump's budget blueprint to boost cybersecurity spending in fiscal year 2018 leads the latest ISMG Security Report. Also, Russian agents charged with Yahoo hack; new White House cybersecurity adviser Rob Joyce profiled.
-
Ransomware: The Defender's Advantage
17/03/2017As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
-
Rating the Security Performance of the Fortune 1000
14/03/2017BitSight Technologies has just concluded a new study that rates the cybersecurity performance of Fortune 1000 enterprises. What are the key takeaways? Data Scientist Jay Jacobs shares his analysis.
-
Will NSA's Rob Joyce Be Trump's Top Cybersecurity Adviser?
14/03/2017The latest ISMG Security Report leads with a profile of Rob Joyce, the National Security Agency operative who is reportedly under consideration to be President Donald Trump's top cybersecurity adviser. Also, cybercriminal ties with Russian intelligence and the lifespan of zero-day vulnerabilities.
-
What Can We Learn from HIPAA Settlements?
13/03/2017An important theme that emerges from the HHS Office for Civil Rights' dozens of HIPAA settlements is that all aspects of compliance are critical and subject to close scrutiny by federal regulators, says former OCR director Leon Rodriguez.
-
Mirai Tools Up for Advanced DDoS Attacks
13/03/2017The source code for the Mirai botnet has been updated to launch DDoS amplification/reflection attacks, although so far that capability hasn't been used, says Gary at Arbor Networks. Even so, DDoS defense planning remains essential.
-
Endpoint Security: Creating Order from Chaos
13/03/2017The rapid evolution of malware and proliferation of solutions have created a state of chaos for security leaders, says Naveen Palavalli of Symantec. What strategy and solutions will help restore order to anti-malware defense?
-
What's Behind WikiLeaks' Release of CIA Hacking Files
10/03/2017Leading the latest edition of the ISMG Security: A deep dive into the WikiLeaks release of thousands of documents that appear to lay open in detail the CIA's computer hacking techniques Report. Also, tackling the rise of attacks targeting the internet of things.
-
Showdown: Prepping Enterprise Security for DDoS Botnets
07/03/2017When it comes to massive DDoS attacks powered by the likes of a Mirai botnet, "the sky is not falling," says ESET security researcher Cameron Camp. But organizations do need to prepare - and here's where to start.
-
Now You See It, Now You Don't: The Return of Crypt0L0cker
07/03/2017A look at the return of the Crypt0L0cker ransomware leads the latest edition of the ISMG Security Report. Also, assuring the security of medical devices; and U.S. federal prosecutors drop charges against a child porn suspect rather than reveal the hacking technique used to ensnare him.
-
Achieving 'Digital Resilience'
03/03/2017To meet the increasing customer demands for effective solutions, security vendors must ensure their products work together well, says Dr. Mike Lloyd of RedSeal. This is particularly essential to achieving "digital resilience," the ability to promptly detect and respond to network intrusions, he says.
-
Verizon: Most Breaches Trace to Phishing, Social Engineering
03/03/2017With Verizon's data breach investigations team finding that 90 percent of breaches trace to a phishing or other social engineering attack, lead investigator Chris Novak says that using multifactor authentication should be a no-brainer for all organizations.
-
Study User Behavior to Focus Intrusion Detection
03/03/2017When trying to detect which security events are malicious, analysts have long battled signal-to-noise problems. LogRhythm's James Carder describes how behavioral analytics, case management, security automation and threat intelligence can help.
-
How Will Europe's GDPR Affect Businesses Worldwide?
03/03/2017The European Union's General Data Protection Regulation, which will be enforced beginning in May 2018, will affect organizations throughout the world because it applies to any company that handles Europeans' personal data, says Fred Kost of HyTrust.
-
Howard Schmidt Dies; Creating CyberSec Framework Metrics
03/03/2017Leading the latest edition of the ISMG Security Report: The death of former White House Cybersecurity Coordinator Howard Schmidt, and a report on legislation to strengthen the influence of the National Institute of Standards and Technology on federal civilian agencies.
-
Using the Cloud to Make Enterprises Less Complex
02/03/2017The cloud can be used to improve security by helping to separate data from applications, networks and other infrastructure, says VMware's Tom Corn.
-
FDA: Dispelling Medical Device Cybersecurity Myths
01/03/2017In an in-depth interview, the Food and Drug Administration's Suzanne Schwartz, M.D., dispels some myths about the FDA's regulatory activities and expectations on the cybersecurity of medical devices.
-
Giving Fraudsters a Taste of Their Own Medicine
28/02/2017In the latest edition of the ISMG Security Report: Analyzing how reflective social engineering can battle cybercriminals who use social engineering to fool users into divulging personal information.
-
Creating a Hack-Proof Computer
27/02/2017The technology and know-how exists to build a hack-proof computer, but doing so won't be easy, says Howard Shrobe, principal research scientist at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory.