Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Defending DHS Against the Insider Threat
03/02/2017A report on passage by the House of Representatives of a bill aimed at toughening insider threat defenses at the Department of Homeland Security leads the latest edition of the ISMG Security Report. Also, analyzing the use of blockchain technology to secure healthcare data.
-
What It Takes to Achieve Digital Trust
02/02/2017With great efficiencies and cost savings also come great threats and fraud risks. This is today's digital reality, and it is why cybersecurity and the user experience need to be aligned to create digital trust, says Scott Clements of VASCO Data Security.
-
OT vs. IT Security: The Need for Different Approaches
02/02/2017Cybersecurity strategies developed for data-centric information technology are not necessarily suitable for protecting operational technology, where availability, rather than confidentiality, is the key security concern, says Vikram Kalkat of Kaspersky Lab.
-
Could Blockchain Support Secure Health Data Exchange?
01/02/2017Blockchain, the distributed ledger technology for cryptocurrency, has the potential to improve the privacy and security of health information exchange, says Shahram Ebadollahi, vice president of innovations at IBM Watson, which is collaborating with the FDA on a research project.
-
Ransomware Didn't Hold Austrian Hotel Guests Hostage
31/01/2017This edition of the ISMG Security Report debunks recent reports suggesting that Austrian hotel guests were locked into - and out of - their rooms by ransomware. Also, would a cybersecurity executive order from U.S. President Donald Trump advance the nation's existing efforts?
-
Why Court Revived Breach-Related Case Against Horizon BCBS
27/01/2017Attorney Steven Teppler analyzes the significance of a federal appellate court's ruling vacating a lower court's decision to dismiss a class action lawsuit against Horizon Blue Cross Blue Shield that was filed in the wake of a breach affecting 840,000 individuals.
-
Gartner's Litan on Endpoint Detection, Behavioral Analytics
27/01/2017Gartner analyst Avivah Litan has long been the go-to expert for insights on fraud detection. Now she has broadened her focus to cover endpoint security and user and entity behavioral analytics. Where do these topics converge, and what insights can she share on the 2017 cybersecurity outlook?
-
White House Staffers Used an RNC Private Email Server
27/01/2017This edition of the ISMG Security Report leads with news that several senior White House staffers had been using a private email server. Also, fueled by worries over Russian hacking, the Australian government plans to educate political parties on improving cybersecurity.
-
HIPAA Enforcement Under Trump: A Forecast
26/01/2017Privacy and security attorney Kirk Nahra offers a forecast for how the Trump administration might address various health data security issues, including HIPAA enforcement, and an assessment of the Obama administration's record on those issues.
-
Privileged Access Management: Break the Kill Chain
25/01/2017Targeted breaches are increasing and they share a common thread - a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.
-
RSA Conference 2017: A Preview
24/01/2017RSA Conference 2017 is coming to San Francisco from Feb. 13 to 17. What new sessions, speakers and venues should attendees expect to see? Conference organizers Linda Gray Martin and Britta Glade offer a preview.
-
Is Trump Militarizing Civilian Cyber Defense?
24/01/2017This ISMG Security Report leads with comments from President Donald Trump that suggest the U.S. military will take the lead in defending civilian-owned critical infrastructure. Also, how insider defenses changed since Chelsea Manning's WikiLeaks data dump.
-
HHS Deputy CISO Spearheads Cybersecurity Effort
23/01/2017Leo Scanlon, deputy CISO at the U.S. Department of Health and Human Services, will take a lead role as HHS sharpens its ongoing focus on cybersecurity issues, an effort that will continue under the Trump administration, he explains.
-
Assessing Obama's Cybersecurity Legacy
20/01/2017In his eight years in the White House, former President Barack Obama made cybersecurity a priority. But will his legacy be his administration's various IT security initiatives or the damaging breaches that occurred during his tenure? That's the lead story in the latest edition of the ISMG Security Report.
-
CynergisTek Gets New Owner: CEO Explains Deal
19/01/2017Mac McMillan, CEO of the information security consulting firm CynergisTek, explains in an interview why he sold the company he co-founded 13 years ago to healthcare document management firm Auxilio Inc., and what's planned next.
-
Defending Against Cyber Threats During M&As
17/01/2017Companies involved in mergers and acquisitions are increasingly targeted with cyberattacks that could potentially derail the deals, says Bryce Boland of FireEye, who outlines the risks and offers tips for mitigating them.
-
FTC Pushes Manufacturer to Secure IoT Wares
17/01/2017In this edition of the ISMG Report: An FTC complaint filed against a camera manufacturer could signal the start of a trend to regulate IoT security. Also, Donald Trump adviser Rudolph Giuliani's cybersecurity credentials are questioned, and a terrorist shooting prompts new privacy guidance.
-
Health Data Exchange: 3 Key Security Steps
16/01/2017Critical issues that must be addressed to pave the way for broader exchange of health information are expanding the use of multifactor authentication and data encryption and making broad improvements in identity management, says David Kibbe, M.D., president and CEO of DirectTrust.
-
Details Emerge on Ukraine Power Grid Hack
13/01/2017Examining the causes of a cyberattack that blacked out Ukraine's power system leads the latest edition of the ISMG Security Report. Also, a report on the Anthem breach and commentary on President-elect Donald Trump's characterization of cybersecurity.
-
Memory-Resident Malware Creating Forensics Challenges
10/01/2017Because cyberattackers are now using memory-resident malware that leave no trace on the disk, forensics experts using traditional methods will face a challenge, says Christopher Novak, director of Verizon's global investigative response unit.