Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Ransomware: Key Elements of Response
19/12/2016Fifty-nine percent of security leaders believe their current ransomware defenses are above average or superior. Yet 53 percent also have been victim of ransomware attacks in the past year. Eduardo Cabrera of Trend Micro discusses this and other results of the Ransomware Response Study.
-
21st Century Cures Act: Analysis of Impact
16/12/2016The impact of the patient data privacy and security provisions of the 21st Century Cures Act, signed into law Dec. 13, will depend, in part, on who is chosen to study key issues and come up with recommendations, says attorney Steven Teppler.
-
Contactless Payments: Addressing the Security Issues
16/12/2016The emergence of contactless chip payments on mobile phones is changing the way transactions are authenticated and secured, Jeremy King of the PCI Security Standards Council explains in this audio interview.
-
Will Hacktivists Launch Attacks to Protest Trump's Presidency?
16/12/2016A report foreseeing homegrown hacktivists showing their displeasure with President-elect Donald Trump by launching cyberattacks against U.S. government sites leads the latest edition of the ISMG Security Report. Also, the details behind the 1 billion-record hack of Yahoo.
-
Breach Attribution and 'Hack Back': Don't Waste Time
14/12/2016Hack attack victims often ask two questions: "Who did it? And can we hack them back?" But after an attack, with time of the essence for blocking further damage, those are the wrong questions for breached organizations to be asking, data breach response expert Alan Brill says in this audio interview.
-
How Can Healthcare Attract Cybersecurity Talent?
14/12/2016The healthcare sector needs to more effectively compete against other industries that are urgently seeking experienced cybersecurity professionals, says Lee Kim of the Healthcare Information and Management Systems Society, who discusses critical steps in this audio interview.
-
New Year, New Threats: 2017 Security Predictions from Malwarebytes
14/12/2016Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories. CEO Marcin Kleczynski offers insight on how to prepare.
-
Security Scorecard: Where Are Consumers Most Engaged?
13/12/2016How much time and effort will consumers put into protecting themselves from identity theft and financial fraud? That was the question posed by Aite Group's Julie Conroy in researching the new Global Security Engagement Scorecard. And the answer might just surprise you.
-
New Law's Impact on IT Security and Privacy Protections
13/12/2016Leading the latest edition of the ISMG Security Report: an analysis of the impact on healthcare information security and privacy of the 21st Century Cares Act, which President Obama signed into law Dec. 13. Also, a report on the spread of malvertising and an update on the Bangladesh Bank cyber heist.
-
How New Technologies Help Hackers Wage Sophisticated Attacks
13/12/2016Hackers are increasingly taking advantage of new technologies, including analytics and artificial intelligence, to launch more sophisticated attacks and commit cybercrimes, Bill Fox, a former federal prosecutor, explains in this interview.
-
New PCI Guidance on Simplifying Network Segmentation
09/12/2016In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
-
Sizing Up Donald Trump's Cybersecurity Acumen
09/12/2016A report on the former head of the NSA and CIA questioning President-elect Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, House Homeland Security Committee Chairman Michael McCaul outlines his vision of Congress' cybersecurity agenda for 2017.
-
Healthcare vs. the IoT Botnet
08/12/2016With their reliance on so many IoT devices, how can healthcare organizations defend against menaces such as the Mirai malware, which exploit these devices to create powerful botnets and launch DDoS attacks? Akamai's Dave Lewis offers tips.
-
Malvertising, Ransomware and the Evolution of Cyber Threats
07/12/2016According to one report, barely one-third of global organizations feel prepared to handle a modern cyberattack such as malvertising or ransomware. Justin Dolly of Malwarebytes explains how security leaders can step up their game in 2017.
-
'Crime as a Service' a Top Cyber Threat for 2017
06/12/2016In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
-
Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection
06/12/2016As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
-
Cybersecurity Panelist on Recommendations to Trump
06/12/2016A just-issued report from President Obama's Commission on Enhancing National Cybersecurity outlines challenges the next administration should address. Observations from one of the panel's commissioners highlight the latest episode of the ISMG Security Report.
-
Would You Re-Hire Your IPS Today?
06/12/2016The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system? Kurt Bertone of Fidelis Cybersecurity lays out what to look for in a next-gen IPS.
-
Measure Security and Its Impact on the Mission
06/12/2016Government entities struggle not just to measure the effectiveness of their cybersecurity controls, but also how their metrics align to the agency's unique mission. Matt Alderman and John Chirhart of Tenable Network Security offer advice.
-
Overcoming Congressional Barriers on Cybersecurity Oversight
02/12/2016Today's ISMG Security Report leads off with House Homeland Security Committee Chairman Michael McCaul and DHS Secretary Jeh Johnson lamenting about the congressional bureaucracy that hinders passage of needed cybersecurity legislation.