Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • Analysis: Walmart's EMV Lawsuit Against Visa

    23/05/2016

    Walmart's lawsuit against Visa, which claims the card brand is unfairly preventing retailers from requiring that customers enter PINs when they conduct EMV debit transactions, poses important questions about fair business practices, says Liz Garner of the Merchant Advisory Group.

  • How to Protect Wearable Device Data

    23/05/2016

    The manufacturers of wearable health devices should incorporate key privacy and security best practices into the R&D of their products, says privacy advocate Michelle De Mooy of the Center for Democracy & Technology, who describes recommendations in a new study.

  • Why Should Government Monitor Mobile Security?

    19/05/2016

    In today's rapidly changing cyber threat environment, the federal government needs to take a lead role in making sure mobile device security is adequate, says security researcher Stephen Cobb, who analyzes ongoing investigations by the FTC and FCC in this audio interview.

  • OCR's Deven McGraw on HIPAA Audit Preparation

    18/05/2016

    Organizations chosen for remote "desk audits" of their HIPAA compliance, which will begin this summer, need to be prepared to quickly provide supporting documentation, Deven McGraw, deputy director of health information privacy at the HHS Office for Civil Rights, explains this in-depth audio interview.

  • There Is No Peacetime in Security: Juniper's Paul

    18/05/2016

    Cyberattacks are increasing in frequency, complexity, nuance and stealth. But human error, business compulsions and increasingly complex environments make it difficult to maintain adequate defenses, says Juniper Network's CTO for India and SAARC

  • Blocking Hack Attacks: SWIFT Must Do More

    18/05/2016

    With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.

  • Legal Expert: Poor InfoSec Culture to Blame in TCS vs. Epic

    13/05/2016

    The $940 billion compensation awarded to Epic Systems in its case against Indian IT major TCS is unprecedented - shaking the industry out of its complacency to information security. Cyber law expert "Naavi" takes a close look at the implications for India.

  • Ransomware: Re-Evaluating Our Defenses

    13/05/2016

    There are two elements of a ransomware attack - the infection and then the action that takes place on infected devices. And both elements are evolving, says Ben Johnson of Carbon Black. He shares insight on how to improve ransomware defenses.

  • Barriers to Adopting Multifactor Authentication

    12/05/2016

    Many financial institutions struggle with implementing effective multifactor authentication solutions. They may lack confidence in new methods or grapple with the difficulty of integrating newer technologies with legacy investments. So, what technologies and processes need to be in place to ensure MFA's adoption throughout the financial sector? Crossmatch's Chris Trytten offers insight and strategies.

  • What's Fueling the Surge in Health Data Breaches?

    12/05/2016

    Breaches in the healthcare sector are continuing to surge, in part, because cybercriminals are building big data resources that can be used to fuel fraud, security experts Larry Ponemon and Rick Kam say in an audio interview discussing findings of a new Ponemon Institute report.

  • Cyber Breach - What If Your Defenses Fail?

    11/05/2016

    It's one thing to talk or even plan about "What happens if we are breached?" It's quite another to undertake a true breach exercise. What are the critical elements of such a drill? Author Regina Phelps shares advice from her new book.

  • Information Security Forum's Durbin on Emerging Threats

    09/05/2016

    The emerging threats posed by cybercrime and evolving banking services, including mobile banking, will be among the focal points of a keynote address by the Information Security Forum's Steve Durbin at ISMG's Fraud & Breach Prevention Summit in Washington May 17-18.

  • Preparing for Round 2 of HIPAA Audits

    09/05/2016

    The HHS Office of Civil Rights is gearing up for round two of HIPAA compliance audits. What should security leaders expect, and how should they prepare? David Holtzman of CynergisTek and Geoff Bibby of Zix offer insights and advice.

  • Beyond Vulnerability Management

    09/05/2016

    With today's multi-layered attack surface, traditional vulnerability management no longer suffices. Security leaders must embrace a new strategy to help identify and secure true assets at risk. Gautam Aggarwal of Bay Dynamics explains how.

  • Internet of Things: Would New Regulations Help or Hurt?

    06/05/2016

    Establishing new laws and regulations to address privacy and cybersecurity concerns related to the Internet of Things would likely be ineffective, attorney Steven Teppler, who co-chairs an American Bar Association IoT committee, says in an audio interview.

  • How to Bake Security Into IT From the Start

    06/05/2016

    NIST's Ron Ross, in an audio interview, explains new draft guidance that's designed to help technology vendors build secure components that their customers can use to build trustworthy information systems. Ross will be a keynoter at ISMG's Fraud and Breach Prevention Summit in Washington.

  • Why Banks Need To Be More Proactive With Security

    05/05/2016

    The digital banking shift creates great convenience - for the fraudsters, as well as the customers. What can institutions do to reduce their vulnerability to breaches and fraud? Dave Allen of Bottomline Technologies offers advice.

  • Smaller Healthcare Organizations: The Next Breach Target?

    04/05/2016

    Clinics, laboratories, durable medical equipment suppliers and other smaller healthcare entities need to bolster their breach preparedness as cyberattacks against smaller entities in all sectors continue to multiply, says David Finn of Symantec, who discusses findings from a new report.

  • Healthcare Taps the Power of Threat Intelligence

    03/05/2016

    Healthcare entities are increasingly in the crosshairs of attackers who seek to cause business disruption. How can threat intelligence bolster cybersecurity defenses? FireEye's Dan McWhorter offers insight and strategies.

  • Tackling Quantum Computing Threats to Cryptography

    02/05/2016

    Within the next 20 years, quantum computing could be applied to easily crack current approaches to cryptography, according to the National Institute of Standards and Technology, which already is beginning work on new approaches to encryption that can withstand the power of quantum computing.

página 91 de 145