Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Retailers: Don't Require Us to Meet Bank Security Standards
13/06/2016The Retail Industry Leaders Association is battling against passage of a national data security and breach notification bill known as the Data Security Act of 2015, arguing it would unreasonably require retailers to meet some of the same security standards as banks, says Austen Jensen, a RILA vice president.
-
Determining If a Ransomware Attack Is a Reportable Breach
10/06/2016While awaiting new guidance from the HHS Office for Civil Rights, healthcare organizations can take several steps to help determine whether a ransomware attack is a reportable breach under HIPAA, says compliance attorney Betsy Hodge.
-
Audio Report: Updates on Infosec Europe, NIST Framework
10/06/2016In the latest ISMG Security Report, our editors examine the top concerns of security practitioners gathered at Infosecurity Europe, NIST's planned revision of its cybersecurity framework and U.S. government efforts to make sure patients can securely access their electronic health records.
-
Tackling the D.C. Security Skills Crisis
09/06/2016The scale of the global IT security skills crisis is well documented. But what is its direct impact on cybersecurity with the government agencies of Washington, D.C.? Dan Waddell of (ISC)² discusses the problem - and a new way to address it.
-
Report: Most Phishing Emails Pack Ransomware
08/06/2016Cybercrime alert: In March, 93 percent of all phishing emails studied contained ransomware designed to forcibly encrypt PCs, says PhishMe chief operating officer Jim Hansen. In an interview, he offers insights on how to respond.
-
Simple Security: How Organizations Fumble the Basics
08/06/2016Many organizations still fail to practice smart web security, warns penetration testing expert Ilia Kolochenko, who notes that 23 percent of all websites still use SSL version 3, despite it leaving them at risk from POODLE and BEAST attacks.
-
NIST Plans Cybersecurity Framework Update
07/06/2016NIST plans next year to clarify certain provisions in its cybersecurity framework. "Just to be clear, we're not headed toward a version 2.0 right now," Program Manager Matt Barrett explains in an interview. "We're headed to something that's more like a 1.1."
-
The Backstory Behind the SWIFT-Related Thefts
07/06/2016This ISMG Security Report features a discussion of the impact on the global financial services industry of the SWIFT-related theft of $81 million from Bangladesh's central bank and similar thefts. You'll also hear reports on making IT systems more trustable and national governments' spending on cybersecurity.
-
Analyzing the Cybersecurity Framework's Value
03/06/2016In this special edition of the ISMG Security Report, a panel of top cybersecurity thought leaders analyzes the value of the Obama administration's cybersecurity framework and its long-term impact.
-
Recruiting CISOs: The Skills Now in Demand
01/06/2016Executive recruiter Bill Liguori helps many organizations find CISOs. What skills are these companies looking for today? Find out in this in-depth interview.
-
Making Information Systems 'Trustable'
31/05/2016Don't blame a lack of information security standards, security products or cybersecurity competence for the failure of breach defenses. In many cases, the culprit is design and implementation flaws in IT products, Robert Bigman, former CIO at the CIA, contends.
-
ISMG Security Report: Examining Global Breach Notification
31/05/2016ISMG editors, in a special report, examine the status of data breach notification laws in a number of regions, including the European Union, which this past week implemented the General Data Protection Regulation, although enforcement won't take place for two years.
-
Gartner's Litan Analyzes SWIFT-Related Bank Heists
31/05/2016Financial fraud expert Avivah Litan, a Gartner analyst, says the SWIFT-related heists, which have defrauded banks out of millions of dollars in recent weeks, are not cause for "the sky is falling" alarm. She recommends key security steps to prevent further such incidents.
-
Mandatory Breach Notifications: Europe's Countdown Begins
27/05/2016Start preparing immediately for the EU's new General Data Protection Regulation - even though it doesn't go into force for two more years - because it mandates a number of new privacy and security requirements, warns cybersecurity expert Brian Honan.
-
ISMG Security Report: To Whom Should CISO Report?
27/05/2016The U.S. Congress delves into the issue of whether CISOs should report to CIOs, a topic that leads the Friday, May 27, 2016, edition of the ISMG Security Report, an on-demand audio report offered every Tuesday and Friday.
-
Ransomware - an Educated Response
27/05/2016Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
-
How Could Congress Help Bolster Healthcare Cybersecurity?
26/05/2016The College of Healthcare Information Management Executives is calling on Congress to create financial incentives for healthcare providers to boost their cybersecurity. Leslie Krigstein of CHIME offers examples of potential incentives in this in-depth audio report.
-
Identity Management as a Business Enabler
25/05/2016Identity and access management should empower businesses, satisfying customers and other stakeholders who need secure access to an enterprise's data and systems, says security expert Jeremy Grant, former leader at the federal government's National Strategy for Trusted Identities in Cyberspace.
-
ISMG Security Report: Unusual Twist in Ransomware
24/05/2016Information Security Media Group is premiering the twice-weekly ISMG Security Report, a concise, on-demand audio report in which ISMG editors and other experts analyze the latest IT security news.
-
Data Protection: The Value of Masking
24/05/2016Data today is money - especially in financial services, where account data is every hacker's target. How, then, can institutions mask that data and protect it when it's in non-production environments? Mike Logan of Delphix offers new insights.