Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Why the ATM Skimming Surge Will Continue in 2017
02/12/2016Why are ATMs a top target for fraudsters? In an interview, Shirley Inscoe, a financial fraud expert and analyst at Aite Group, offers insights based on a new study and predicts the surge in skimming will continue next year.
-
Experian: Why Cyberattacks Could Escalate to 'Cyberwar'
01/12/2016Cyber espionage and other increasingly sophisticated nation-state cyberattacks will escalate into what amounts to "cyberwar" in 2017, predicts security expert Michael Bruemmer of Experian Data Breach Resolution.
-
Fighting Organized Cybercrime: A New Approach
30/11/2016Cyberattacks waged by organized crime groups are simultaneously targeting a wider array of industries worldwide, which is why cross-industry threat information sharing is more critical than ever, says Brian Engle, executive director of the Retail Cyber Intelligence Sharing Center.
-
San Francisco Battles Public Transport Ransomware Outbreak
29/11/2016The latest ISMG Security Report leads with a look at the ransomware attack against San Francisco's light rail agency. Also featured is an analysis of the ongoing fallout from Australia's online census project.
-
HIPAA and the Internet of Things: Addressing Gaps
28/11/2016Healthcare entities must perform security due diligence when they consider introducing emerging technologies - including "internet of things" devices - into their environments, says attorney Stephen Wu, author of a new book on HIPAA compliance.
-
Soltra Edge Revived with New Owner
23/11/2016Soltra Edge, the automated threat intelligence sharing platform that had been slated to be phased out, has been rescued by NC4, a cyber threat intelligence firm that has purchased the platform, Bill Nelson of FS-ISAC explains in this exclusive audio interview.
-
How NSFOCUS Protected the G20 Summit
23/11/2016In September, the annual G20 summit - the gathering of leaders from 20 major global economies- was held in China. NSFOCUS was selected to provide security protection. Guy Rosefelt discusses that mission and its unique challenges.
-
The 2017 Mobile Enterprise: Security Challenges
22/11/2016So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
-
Security Analysis: Regulating IoT; Protecting Obamacare Data
22/11/2016The latest ISMG Security Report leads with a look at how to protect patient data should President-elect Donald Trump and the Republican-led Congress follow through with their promise to dismantle Obamacare. Also featured is a discussion of whether IoT security should be regulated.
-
Why Merchants Object to Visa's EMV Debit Routing Rules
21/11/2016Retail groups are asking Visa to clarify how it plans to level the playing field for EMV adoption in the U.S. - especially for routing EMV debit payments. In an interview, Mark Horwedel of the Merchant Advisory Group explains MAG's objections to Visa limiting merchants' transaction options for debit payments.
-
New Way to Build Secure Trustworthy Systems
18/11/2016Highlighting the latest ISMG Security Report: National Institute of Standards and Technology's Ron Ross explains how a new approach employing engineering principles can be used to build secure, trustworthy systems. Also, when a ransomware attack is deemed a breach.
-
How and When Will Trump Tackle Healthcare IT Reforms?
15/11/2016An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
-
Did Weak InfoSec Sway Election?
11/11/2016The breach of Democratic Party computers led to the release of a trove of emails embarrassing to Hillary Clinton that might have swayed the election. Should the IT security community fess up? Also, top government cybersecurity policymakers assess President-elect Donald Trump as an IT security influencer.
-
Obama's Cyber Review Leader on What's Ahead for Trump
09/11/2016Donald Trump pledges to conduct a review of U.S. cyber defenses and vulnerabilities as one of his first acts as president. Melissa Hathaway, who led a similar review for Barack Obama nearly eight years ago, says it's important for an incoming president to get the lay of the land.
-
New Tools Aim to Close the Cybersecurity Skills Gap
08/11/2016Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known as CyberSeek; the other is updated guidance known as the NICE Cybersecurity Workforce Framework. In this audio report, NICE Director Rodney Petersen explains the connection between the two.
-
The Kim Kardashian Security Wake-Up Call
08/11/2016Thank Mark Zuckerberg's taped-over webcam and the Paris robbery of Kim Kardashian West for waking up the average consumer to the security risks they face from using technology and social media, social engineering expert Sharon Conheady says in this audio interview.
-
How FBI Quickly Reviewed 650K Emails on Clinton Aide's PC
08/11/2016An explanation of how the FBI likely was able to quickly review 650,000 emails found on a computer shared by a top aide to Democratic Party presidential nominee Hillary Clinton leads the latest ISMG Security Report. Also, this week's ISMG Fraud and Breach Prevention Summit in London is previewed.
-
The Challenge of Defending the Domain Name System
07/11/2016The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
-
Clinton Email Investigation: A Forensics Perspective
07/11/2016How did the FBI likely approach its examination of the computer of Hillary Clinton's close aide Huma Abedin to determine if it contained classified materials? Forensic expert Rob Lee explains just how such an examination occurs.
-
Moving to Office 365: The Security Concerns
07/11/2016As organizations prepare to transition to Microsoft Office 365, what should be their top security concerns - and how should they address them? Symantec's Deena Thomchick offers insight and tips.