Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Rivals Avoid Taking Stand on Backdoor
19/01/2016If presidential candidates don't have the technical know-how to take an educated stand on whether tech companies should provide the government with a backdoor to encryption, how can we judge if they'll make the right choice if they get elected?
-
Special Report: Identifying Malicious Insiders
18/01/2016In this in-depth audio report, a panel of experts addresses the challenge of detecting insider threats and outlines the latest approaches, including "sentiment and linguistic" systems.
-
Malware: A Battle Plan for Smaller Organizations
14/01/2016One of the most dangerous myths about malware is that hackers aren't targeting smaller healthcare entities, says security researcher Lysa Myers, who offers mitigation insights for clinics and others.
-
Where Will We Find Next Generation of Security Leaders?
12/01/2016As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
-
Mitigating the Accidental Insider Threat
12/01/2016When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Mike Siegel, VP of Products at Forcepoint, shares strategy and solutions.
-
New Global Alliance Seeks Measurable InfoSec Solutions
11/01/2016The primary mission of the new Global Cyber Alliance is to identify measurable ways to mitigate cyberthreats facing the public and private sectors, says Phil Reitlinger, a former DHS official and Sony CISO, who heads the new group.
-
Why Traditional Security Tools Can't Cut it
08/01/2016Today's enterprise infrastructure is full of blind spots that can hide malicious threats, and traditional security tools struggle to scale up to meet increased demands. How must security leaders respond? Amrit Williams of CloudPassage shares insight.
-
Analysis: Unusual Ruling in Massachusetts Breach Case
07/01/2016Attorney Kevin McGinty analyzes the potential impact of a Massachusetts judge's unusual decision to allow a class-action lawsuit stemming from a health data breach to proceed, despite a lack of evidence of harm stemming from the incident.
-
Gartner's Litan: FFIEC Assessment Tool Falls Short
06/01/2016The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.
-
2016 Breach Prevention: Time to Purge Data
05/01/2016Expect rebooted European Union data privacy rules to drive organizations worldwide to begin minimizing the amount of information they collect and store on individuals in 2016, both to protect privacy as well as minimize the impact of data breaches.
-
Another Rocky Year Ahead for Health Data Security
04/01/2016In the healthcare sector in 2016, hackers will continue to threaten systems and networks - and possibly medical devices - while federal and state regulators expand and refine their data security enforcement activities.
-
Cybersecurity as a Competitive Advantage
04/01/2016Boards of directors that figure out how to leverage cybersecurity as a strategic asset will give their organizations a strong competitive advantage, says Lance Hayden of Berkeley Research Group. "Security needs to be part of what the organization uses to competitively differentiate itself."
-
2016: Year of Cyberthreat Info Sharing
04/01/2016In the coming months, the Department of Homeland Security will implement a new cyberthreat information sharing law designed to help prevent breaches. But will the Cybersecurity Act of 2015 really make a difference?
-
OPM Breach: A Game Changer in 2015
30/12/2015The hack of the Office of Personnel Management, revealed in June, represented a turning point. As a result of the cyberattack, breaches became a concern of a wide sphere of government employees and citizens.
-
2015: Worst Year for Healthcare Hacks
30/12/2015Without a doubt, 2015 was the year of the healthcare megabreach and a major turning point for the sector. The hacking incidents are a blaring wake-up call to safeguard patient data.
-
The 2 Worst Breaches of 2015
30/12/2015The breaches of the infidelity online dating service Ashley Madison and toymaker VTech illustrate how cyber intrusions got worse in 2015, thanks to organizations failing to secure private information.
-
Solve Old Security Problems First
30/12/2015Improving breach detection and defenses involves much more than buying the latest technology, warns security expert Haroon Meer. "We keep moving on as we try to solve new, shiny problems, which we then half solve, but we still haven't completely solved problems that we knew about 20 years ago."
-
What's Next for Cybersecurity Framework?
29/12/2015NIST is soliciting comments from stakeholders on whether its cybersecurity framework is helping organizations secure their information systems. Those observations could result in an update of the framework, NIST's Adam Sedgewick explains in this interview.
-
Mitigating Mobile Risks in Healthcare
28/12/2015Security expert Chris Bowen explains why mitigating emerging threats to mobile devices and applications should be a top health data breach prevention priority for 2016.
-
The Practical Application of User Behavior Analytics
24/12/2015Understanding the promise of user behavior analytics is one thing. Deploying them to detect and respond to threats is quite another. Bert Rankin of Fortscale offers tips on practical application of the latest UBA solutions.