Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Deep Dive: US Intelligence Report Into Russian Hacking
10/01/2017Hack analysis: The latest edition of the ISMG Security Report closely examines the U.S. intelligence community's assessment of how the Russian government allegedly tried to influence the American presidential election through breaches, social media and fake news.
-
Special Report: Trump vs. US Intelligence Community
06/01/2017The latest episode of the ISMG Security Report focuses on the clash between President-elect Donald Trump and the U.S. intelligence community on whether the Russian government directed the hack of Democratic Party computers to influence the American presidential election.
-
IoT: The Need to Expand the Scope of Security
05/01/2017To deal with the risks posed by the explosive growth of the internet of things, CISOs and CIOs must expand the scope of their security efforts, says Ganesh Ramamoorthy, vice president of research at Gartner.
-
Addressing Vulnerabilities in Medical Devices
03/01/2017Medical device makers need to ensure they have procedures in place to take quicker action once they're alerted of cybersecurity issues in their products, says attorney Yarmela Pavlovic, who specializes in healthcare regulatory issues.
-
TalkTalk Breach Investigation: Top Cybersecurity Takeaways
03/01/2017A U.K. Information Commissioner's report on its investigation into a 2015 TalkTalk breach offers essential information security takeaways for any organization that wants to avoid being breached, says David Stubley of 7 Elements.
-
The Shift to Intelligent Hybrid Security
03/01/2017Advanced threats are multi-layered and borderless - and so are today's enterprises. These are among the factors pushing organizations to adopt the Intelligent Hybrid Security approach, says Anil Nandigam of NSFOCUS.
-
Doubts Raised on Value of Sanctions Against Russia
03/01/2017The latest episode of the ISMG Security Report leads with security experts questioning the effectiveness of U.S. imposed sanctions against the Russians to stop Kremlin-backed cyberattacks.
-
Transition to Trump Administration: The Cyber Risks
02/01/2017As the Trump administration begins, expect a ramp-up in cyber espionage as well as more "test attacks" by nation-states, says cybersecurity specialist Brad Medairy of the consultancy Booz Allen Hamilton.
-
Defending Encryption from Quantum Computers
30/12/2016An analysis of a National Institute of Standards and Technology initiative to identify algorithms that could defend encryption against attacks from quantum computers leads the latest edition of the ISMG Security Report. Also featured: An update on new FDA guidance on cybersecurity for medical devices.
-
Operational Technology: The Next Security Challenge
29/12/2016Now that more breaches are targeting industrial control systems, organizations that have paid little attention to operational technology security must ramp up their protection efforts, says breach response expert Christopher Novak of Verizon.
-
How to Battle IoT Devices Infected with DDoS Malware
28/12/2016With the rise of malware infecting IoT devices, DDoS defenders "have to assume that the attackers have an unlimited supply of machines that they can compromise," says Akamai's Michael Smith. But quarantines, ISP feedback loops and better patch management can bolster defenses.
-
2017: 'Year of the Breach' Redux?
28/12/2016Will more "historical" breaches be revealed in 2017 and beyond? Data breach expert Troy Hunt is optimistic that such revelations will become rare as large businesses operating online continue to improve security. But what about small and mid-size organizations?
-
Cyber Threat Awareness Education: A Priority for 2017
28/12/2016Because cyber threats are becoming increasingly sophisticated, bolstering employee and customer awareness and training about ransomware, phishing and other cyber risks must be a top priority in 2017, says Curt Kwak, CIO of Proliance Surgeons.
-
The Changing Face of Cyber Espionage
28/12/2016Cyber espionage groups are using unconventional channels to hack target organizations, according to Mandiant' s latest research. Trusted service provider relationships are being exploited to compromise organizations in government and defense, says Rob van der Ende, Mandiant's vice president for Asia Pacific and Japan.
-
Threat Intelligence: The Difference Between Good and Bad
27/12/2016Security software often generates so many warnings that it can be difficult to figure out which ones are the most serious. How can one differentiate good intelligence from bad? John Watters, founder of iSight Partners, discusses how to separate the signal from the noise.
-
Special Report: Conversations About Nation-State Adversaries
27/12/2016In this special edition of the ISMG Security Report, DataBreachToday Executive Editor Mathew Schwartz discusses the Russian groups behind damaging hacks against the U.S. and Strategic Cyber Ventures CEO Tom Kellermann details cyberthreats posed by the West's nation-state adversaries.
-
2017 Cybersecurity Predictions: The Impact of Trump Election
26/12/2016Hacks sponsored by nation-states and attacks fueld by IoT-powered botnets are just some of the daunting threats we will see in 2017, says cybersecurity thought leader Tom Kellermann. What are his top predictions, and how should security leaders respond?
-
House Working Group: Encryption Bypasses a Bad Idea
23/12/2016This edition of the ISMG Security Report features an analysis of recommendations by a U.S. House Encryption Working Group that Congress should not enact legislation that requires technology companies to help law enforcement authorities bypass encryption on the devices they manufacture.
-
The Urgent Need to Recruit More Cybersecurity Pros
22/12/2016As cybercriminals continue to wage more sophisticated, well-funded attacks, it's more urgent than ever to attract qualified professionals to careers in cybersecurity, Symantec CTO Dr. Hugh Thompson says in this audio interview.
-
Senators Call for Select Panel to Probe Hacks Said to Sway Vote
20/12/2016Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.