Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
States Warned of Possible Attack Against Voter Systems
30/08/2016A report on an FBI warning to state election officials that their IT systems could be hacked leads the latest edition of the ISMG Security Report. Also, Australian officials mull bitcoin technology to secure elections.
-
Why Asia-Pacific Lags in Data Breach Detection
29/08/2016Why is the Asia-Pacific region lagging far behind Europe and the United States in detecting data breaches? Rob van der Ende, vice president at FireEye's Mandiant, analyzes the results of the firm's new M-Trends Report 2016 for the Asia-Pacific Region and pinpoints breach detection shortcomings.
-
Just In Case: Saving Up to Pay Off Ransomware Attacker
26/08/2016A report exploring how some organizations have been stockpiling bitcoins to use to pay off attackers if, or when, they become victimized by ransomware attacks leads the latest edition of the ISMG Security Report.
-
Patch or Perish: Fix Which Flaws First?
25/08/2016The process of managing software vulnerabilities inside the enterprise is complicated by the sheer number of patches that must be assessed, applied, tested and rolled out, says Wolfgang Kandek of Qualys, who offers suggestions on how to better focus those efforts.
-
Mitigating the Maturing Mobile Threat
25/08/2016For years now, security experts have been predicting 'the year mobile threats come of age.' Is it finally here? BioCatch's Uri Rivner discusses the recent surge in mobile threats - and what to do about them.
-
The Maturing of the InfoSec Workforce
24/08/2016Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.
-
Demystifying the Dark Web
24/08/2016By nature of its name and reputation, the so-called "dark web" has acquired a unique reputation. Danny Rogers of Terbium Labs discusses some of the key myths and realities about the dark web, as well as how organizations should monitor it.
-
Making USB Great Again
23/08/2016A report analyzing the development of a defense against attackers who exploit USB devices to hack into computers leads the latest edition of the ISMG Security Report.
-
The Details Behind HHS Breach Investigation Ramp-Up
23/08/2016In this in-depth interview, Iliana Peters of the HHS Office for Civil Rights explains the agency's strategy for ramping up investigations of health data breaches affecting fewer than 500 individuals.
-
Providing Frictionless ID Management
22/08/2016Passwords' days are numbered as businesses attempt to deliver a better user experience to their online customers, as well as apply better identity management practices, says CA's Paul Briault.
-
Tackling the Rising Cost of Security
22/08/2016Security spending - as a percentage of IT budgets - in recent years has been getting out of hand, says Chris Richter of Level 3 Communications, who offers suggestions for how to better keep costs under control.
-
NIST Updating Guidance on Protecting Federal Information
19/08/2016In an in-depth interview, Ron Ross of the National Institute of Standards and Technology explains pending revisions of guidance on how organizations outside the U.S. government should protect sensitive federal data.
-
Tackling Medical Device Security as a Public Health Issue
19/08/2016Medical device cybersecurity must be recognized as a critical public health issue so that all segments of the healthcare sector understand their roles in addressing the many complicated challenges involved, says Dale Nordenberg, M.D., of the Medical Device Innovation, Safety and Security Consortium.
-
Unraveling the Mystery Behind the Equation Group
19/08/2016Hear ISMG editors untangle the various elements in the Shadow Brokers-Equation Group saga, evaluate a new anti-ransomware tool and reflect on the 10th anniversary of the PCI Security Standards Council in this edition of the ISMG Security Report.
-
Using Cybernetics to Tell the Security Story
18/08/2016Sam Lodhi, director at niche services firm IBRS, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other verticals.
-
When a DDoS Attack Isn't a DDoS Attack
16/08/2016A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy standards more stringently.
-
Medical Device Security: Creating an Inventory
15/08/2016The creation of sophisticated inventory systems is critical to ensuring the security of an organization's diverse medical devices, says Dale Nordenberg, M.D., who heads a medical device security consortium. Learn about the group's latest efforts in this arena.
-
Taking Initial Steps to Create an ISAO
15/08/2016The head of the nearly year-old ISAO Standards Organization, Greg White, describes how fledgling Information Sharing and Analysis Organizations can help create an information sharing ecosystem aimed at making IT more secure at enterprises of all sizes.
-
How Patient Consent Policies Affect Health Info Exchange
12/08/2016Granular patient consent policies - adopted despite HIPAA allowing certain data to be shared without explicit patient consent - can lead to less data being exchanged by healthcare entities, says researcher Julia Adler Milstein of the University of Michigan, who describes results of a new study.
-
The Russians Are Coming, the Russians Are Here
12/08/2016A series of analytical reports on the threats posed by Russian hackers and how to create cyber defenses highlight the latest edition of the ISMG Security Report.