Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
New Counter-Fraud Strategies for the Insurance industry
24/11/2015Insurance fraud schemes are growing in scale and sophistication. But at the same time, insurance companies - and their customers - are losing their appetite to accept fraud losses. IBM's Brian Banigan offers insight on the latest counter-fraud solutions.
-
What is 'Sleeper Fraud,' And Why Must Banks Beware?
24/11/2015The surge in data breaches has left millions of consumer records compromised. As a result, fraudsters have all they need to open bogus accounts, which cost banks huge losses linked to what Greg Shelton of LexisNexis Risk Solutions calls "sleeper fraud."
-
LabMD CEO Speaks About FTC Legal Battle
23/11/2015LabMD's recent victory in its long legal battle with the Federal Trade Commission will be short-lived, the medical testing lab's CEO predicts. Find out why, and what changes Michael Daugherty hopes the case will bring to FTC's enforcement practices.
-
Rethinking How to Recruit InfoSec Pros
20/11/2015NICE's Rodney Petersen sees too many government agencies and businesses using old-school methods to identify and recruit IT security professionals. Consequently, they often fail to build their cybersecurity staffs.
-
Will FTC Ruling Impact Future Data Security Cases?
18/11/2015The ruling to dismiss the FTC's data security case against medical lab LabMD will result in FTC staff more carefully vetting the enforcement cases the agency pursues against all other companies in the future, predicts former FTC attorney Reed Freeman.
-
After Paris Attacks, Beware Rush to Weaken Crypto
17/11/2015In the wake of the Paris attacks, cybersecurity expert Brian Honan argues that now is not the time to make snap public policy decisions that attempt to promote or restrict either cryptography or surveillance.
-
Paris Attacks Reignite Encryption Debate
17/11/2015The terrorist attacks in Paris likely would have occurred even if intelligence and law enforcement agencies could have broken encryption Islamic State attackers used in their communications to plan the assault that killed at least 129 people.
-
What the JPMorgan Chase Breach Teaches Us
16/11/2015The massive cyberattacks that struck Chase and other leading U.S. financial services firms illustrate just how vulnerable larger institutions can be to cyber-attacks. They also show why organizations must encrypt customer data, says security and forensics expert Chuck Easttom.
-
Breach Response: Fighting Persistent Intruders
13/11/2015Because hackers often find a way to stick around or repeat their network intrusions after remediation efforts are completed, organizations need to ramp up their "continuous detection" efforts, says security expert Wendi Whitmore of CrowdStrike.
-
Why Banks Need to Prepare for More Chase-Like Breaches
11/11/2015Banks need to prepare for many more massive cyberattacks along the lines of the sophisticated campaign that hit JPMorgan Chase and other financial services organizations, says Javelin Strategy & Research's Al Pascual, who offers risk management insights.
-
PHI Breaches: Not Just Healthcare Sector's Problem
11/11/2015An upcoming Verizon report on health data breaches illustrates that the data is at risk at organizations outside of the healthcare sector, and not just at hospitals, clinics, insurers and their business associates, says security expert Suzanne Widup of Verizon Enterprise Solutions.
-
Why Tinba Trojan Is Now a Global Concern
04/11/2015Tinba, which has been linked to attacks in the U.S., Canada and Europe, is now targeting bank accounts in Russia, according to a new report from Dell SecureWorks. Researcher Brett Stone-Gross tells why Tinba is unusual and can be tough to detect.
-
ONC's Top Privacy Priorities for 2016
02/11/2015Now that it has issued a 10-year roadmap for secure, interoperable health information exchange, the Office of the National Coordinator for Health IT has a number of privacy-related projects planned for 2016, says Lucia Savage, ONC's chief privacy officer. She spells those out in this in-depth interview.
-
Art Coviello's New Cybersecurity Agenda
30/10/2015A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.
-
Cybersecurity: The CEO's Responsibilities
29/10/2015Many CEOs and boards of directors are failing their companies by not truly understanding their cybersecurity risks, says Steve Durbin of the Information Security Forum. He stresses that senior leaders must ensure their organizations provide adequate funding to manage risks.
-
Mergers Create Challenges for CISOs
28/10/2015Mergers and acquisitions create challenges for CISOs, including allocating resources to meet the information security needs of newly united companies, says Joey Johnson, CISO of Premise Health.
-
CISO's Guide to Spear Phishing Defense
26/10/2015Everyone's talking about business email compromise, but what they aren't talking enough about is what's at the root of these attacks - spear phishing. Joseph Opacki of PhishLabs discusses how security leaders must respond to the threat.
-
TalkTalk Attack Highlights Worldwide Breach Concerns
26/10/2015The recent data breach at U.K.-based telecom company TalkTalk illustrates that breach risk mitigation is a critical issue worldwide. PCI's Jeremy King, who will be a featured speaker at ISMG's Fraud Summit London on Oct. 27, explains why European data security is getting more scrutiny.
-
Solving Secure Email Platform Challenge
19/10/2015Building a strong platform to secure enterprise email systems is like piecing together a puzzle by joining existing technologies from various sources. NIST is readying a guide to do just that.
-
Threat Intel Sharing Project: A CISO Leads the Way
16/10/2015In an exclusive interview, Harris Health System CISO Jeffrey Vinson explains how his team is spearheading an effort to help the federal government and the healthcare industry improve cyber threat intelligence sharing.