Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Why Is Ransomware So Successful?
20/09/2016Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes, CTO at Trend Micro.
-
Aligning Cyber Framework with Organization's Strategy, Goals
20/09/2016A report on a new self-assessment tool that's intended to show whether an enterprise's cyber-risk initiative aligns with its goals and strategy leads the latest edition of the ISMG Security Report.
-
Helping Police Solve Cybercrimes
19/09/2016Because many law enforcement agencies lack cybercrime expertise, it's important for companies that have been attacked to provide as much technical and forensic information as possible to authorities to help ensure that investigations lead to arrests and prosecutions, a panel of experts says.
-
Safeguarding Data from Politically Motivated Breaches
16/09/2016The recent hacker attack targeting the drug records of Olympic athletes, as well as other breaches involving high-profile targets, highlight the challenges involved in protecting sensitive data from external attackers or malicious insiders driven by political and other causes, says security expert Sean Curran.
-
ISMG Summit Wrap Up: Data Complexity Facilitates Cyber Risk
16/09/2016A roundup of the just-concluded ISMG Fraud and Breach Prevention in Toronto leads the latest edition of the ISMG Security Report. Also, how one CISO gets his security message across to the board and the challenges CISOs face during their first 100 days on the job.
-
Security Investments Shifting to Detection and Response
14/09/2016The paradigm shift in security from prevention to detection and response has finally arrived in Asian markets, says Sid Deshpande, Gartner principal analyst, who shares insights on 2016 trends.
-
Senator Seeks Probe of Bank Over Privacy Violations
13/09/2016Bank watchdog Sen. Elizabeth Warren is going after Wells Fargo for violating the privacy of bank customers. This news leads the latest edition of the ISMG Security Report.
-
A CISO's First 100 Days
09/09/2016The first 100 days on the job can be daunting for security leaders as they work toward understanding the organization's posture, while at the same time defending it around the clock. Gartner's Tom Scholtz shares insights on meeting key milestones.
-
Does Donald Trump Understand Cybersecurity?
09/09/2016An analysis of U.S. Republican presidential candidate Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, the U.S. federal government gets its first chief information security officer.
-
Why Healthcare Needs to Standardize Threat Info Sharing
08/09/2016Cyber threat information sharing in the healthcare sector urgently needs to be standardized so organizations can take appropriate action based on the intelligence, says Jeffrey Vinson, CISO of Harris Health System, who discusses findings emerging from ongoing federally funded research.
-
Building an Effective Network Defense Using Threat Intelligence
06/09/2016Based on Lockheed Martin's experience in the aftermath of a data breach, the company advises organizations to diligently gather threat intelligence internally to support development of an effective mitigation strategy, says Chris Coryea, cyber intelligence specialist.
-
Understanding the Threat Intelligence Ecosystem
06/09/2016Everybody talks about threat intelligence today, but how well are they distinguishing raw data from actionable intelligence? Stephen Gates of NSFOCUS discusses cybersecurity and the new threat intelligence ecosystem.
-
Did Outdated Systems Pave Way to OPM Hack?
06/09/2016The ISMG Security Report leads with a report on Federal CIO Tony Scott partly blaming the way Congress funds agencies for the 2015 breach of computers at the Office of Management and Budget that exposed 21.5 million records.
-
Reporting Medical Device Security Issues the Right Way
02/09/2016A report on the implications of failing to notify manufacturers of security flaws in their medical devices and a conversation with internet co-founder Vint Cerf highlight the latest edition of the ISMG Security Report.
-
When Do Medical Device Security Flaws Equal Clinical Risk?
01/09/2016At least some of the alleged cybersecurity vulnerabilities in St. Jude Medical cardiac devices that were found by research firm MedSec Holdings don't necessarily translate to serious clinical risks for patients, says medical device security expert Kevin Fu.
-
Defending the Inside and Outside of Data Centers
01/09/2016Data centers are difficult to defend, and securing the perimeter is important but of little consequence if attackers get inside. But there are ways to lock down data centers, former White House strategist Nathaniel Gleicher explains in this interview.
-
US CIO: Federal Funding Process Played Key Role in OPM Hack
01/09/2016The way the U.S. federal government funds information technology served as a major contributor to last year's breach of computers at the Office of Personnel Management that exposed 21.5 million records, says Federal Chief Information Officer Tony Scott.
-
How to Cope With Intelligence Agency Exploits
31/08/2016Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.
-
Vint Cerf's Outlook for the Internet He Helped Create
31/08/2016In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
-
What's the Best Way to Handle Medical Device Security Concerns?
30/08/2016Cybersecurity expert Joshua Corman analyzes the importance of properly handling disclosure of medical device vulnerabilities to avoid jeopardizing patients' health. He laments that the proper protocol was not followed when allegations about devices from St. Jude Medical, which the firm refutes, were made public.