Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • Apple Case Creates Important Policy Debate

    04/03/2016

    Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.

  • VA Gov. McAuliffe on Cybersecurity

    04/03/2016

    Virginia Gov. Terry McAuliffe has a message for state leaders across the nation: Cybersecurity has to be a top item on their policy platforms. And, by the way, he very much intends to make Virginia the cyber capital of the United States.

  • Tips on Protecting Against Ransomware Attacks

    04/03/2016

    Healthcare organizations must take several important steps to protect their environments against ransomware attacks, says Mac McMillan, CEO of the security consulting firm CynergisTek. He outlines key measures in this interview.

  • Spotting Breaches by Studying Users

    04/03/2016

    Organizations can apply user behavioral analytics - the practice of reacting to how people behave in the information security realm - to better spot and block data breaches, says Fortscale's Kurt Stammberger.

  • Emerging ID Management Issues for 2016

    03/03/2016

    Identity management is going to be a big issue in 2016, and emerging authentication tools, such as biometrics, could very well gain a more significant foothold, although not without posing new risks, says Steve Martino, CISO at Cisco Systems.

  • Cloud Computing: The Security Concerns

    03/03/2016

    Attacks against the cloud, using the cloud for command and control of malware attacks, and securing endpoints are posing big worries for all industries, says Brian Kenyon of Blue Coat Systems.

  • Will 2016 Be a Record Year for HIPAA Penalties?

    02/03/2016

    This could be a record year for HIPAA enforcement actions by federal regulators, both in the number of resolution agreements and in the size of financial settlements resulting from breach investigations, predicts privacy attorney Adam Greene.

  • 'Industrialization' of Cybercrime: Sizing Up the Impact

    02/03/2016

    The "industrialization" of cybercrime, remote-access attacks and mobile-banking application and online-browser overlay attacks are trends the financial industry should monitor this year, says George Tubin of IBM Security Trusteer.

  • HIPAA Audits: A Progress Report

    02/03/2016

    The HHS Office for Civil Rights is making progress toward launching the long awaited next round of HIPAA compliance audits, which will consist mostly of desk audits. In a critical step, it plans to release its proposed new audit protocol in April, says Deven McGraw, OCR's deputy director of health information privacy.

  • Are We Approaching Security Wrong?

    01/03/2016

    Too many companies that provide cybersecurity solutions are failing to focus on helping organizations control risk at a reasonable cost, argues Malcolm Harkins, CISO at Cylance.

  • Cutting Debit Fraud: Lessons from Canada

    01/03/2016

    Debit fraud losses in Canada hit an all-time low in 2015, mainly because of the nearly complete migration to EMV and real-time settlement of debit payments, says Mark Sullivan, who heads fraud management for Interac, Canada's payment network. He offers important lessons for the U.S.

  • Why Bad Security Habits Are So Hard to Break

    29/02/2016

    Despite the pervasiveness of data breaches, healthcare organizations are still playing catch-up on implementing strong, risk-based security programs, rather than focusing solely on HIPAA compliance, says David Finn of Symantec. He offers a preview of his session at the HIMSS 2016 Conference about a new survey.

  • DHS Eyes Malware Provenance to Identify Malicious Code

    29/02/2016

    The Department of Homeland security sees malware provenance - which identifies the attributes of malicious codes - as a way to complement its signature-based Einstein intrusion detection and prevention systems to find malware that infects IT systems.

  • Adapting Cybersecurity Contests as a Recruitment Tool

    24/02/2016

    Cybersecurity competitions are being adapted so employers can use them to vet the know-how of prospective employees, U.S. Cyber Challenge National Director Karen Evans says.

  • Cloud Security: It's Now an Enabler

    24/02/2016

    It used to be that security was the one big barrier to organizations embracing the cloud. But Troy Kitch of Oracle says that not only is that barrier coming down, but now leaders are seeing cloud as a security enabler.

  • PCI DSS Update: What to Expect

    24/02/2016

    The PCI Security Standards Council will soon release an update to its PCI Data Security Standard, requiring the use of multifactor authentication for administrators who have access to card data networks. In an interview, the council's Troy Leach explains the new requirements and compliance expectations.

  • Case Study: Practical Breach Prevention, Detection Steps

    23/02/2016

    In an in-depth interview, CIO Ed Ricks of Beaufort Memorial Hospital in South Carolina offers insights on how the community hospital, with limited resources, is tackling breach prevention and detection. He'll be a featured speaker at the HIMSS 2016 Conference.

  • Creating Cybersecurity Rating Systems for Cars

    22/02/2016

    Automobiles have crash ratings. Do they need ratings for cybersecurity, too? In this interview, security expert Jacob Olcott of BitSight Technologies previews a session he'll moderate at the RSA Conference 2016 that will address this question.

  • The Crypto Debate: Apple vs. the FBI

    19/02/2016

    It's the perfect time to debate whether the government should compel Apple to help the FBI circumvent protections blocking access to the San Bernardino shooter's iPhone. Hear Apple CEO Tim Cook, FBI Director James Comey, Sen. Marco Rubio and cryptologist Bruce Schneier in this audio report.

  • Strategies for Advanced Endpoint Protection

    19/02/2016

    In 2015 alone, 84 million new pieces of malware were created. How can organizations hope to keep pace with the new strains and tactics? Through advanced endpoint protection, says John Peterson of Comodo.

página 94 de 145