Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Storm Prep Key to Recovery
30/10/2012It's been compared to the 'perfect storm,' but Hurricane Sandy is unlike any storm we've seen, says Alan Berman of DRI. He believes organizations have planned well for recovery.
-
Hurricane Sandy: Triple-Threat Disaster
29/10/2012Hurricane Sandy threatens buildings, staff and data alike, posing a daunting challenge to business continuity pros. Disaster recovery expert Regina Phelps offers tips for weathering the storm.
-
Insights on Protecting Genomic Data
26/10/2012Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
-
DDoS Attacks: First Signs of Fraud?
26/10/2012Distributed-denial-of-service attacks on U.S. banking institutions will continue, says Akamai's Mike Smith. And he believes the attackers aren't out just to embarrass the banks, but to commit fraud.
-
Breaches: Small Incidents Add Up to Greatest Losses
25/10/2012The big breaches make the headlines, but the smaller attacks on merchants are the ones that ultimately benefit the fraudsters and hurt banking institutions most, says Wade Baker of Verizon.
-
Is U.S.-China Détente in the Air?
24/10/2012Talks among IT security experts from 40 nations meeting in New Delhi could lead to treaties on cybersecurity, including, perhaps, a cyber détente between the United States and China, Deloitte Center for Cyber Innovation's Harry Raduege says.
-
Experts Offer Fed Infosec Governance Plan
24/10/2012A group of highly respected IT security thought leaders is calling on the Obama administration to exercise existing powers to strengthen the processes the federal government employs to secure its information systems.
-
CISO's Challenge: Security & Risk
23/10/2012CISOs increasingly are asked to manage both information security and risk. What new skills and tools do they need to juggle the dual role? David Sherry, CISO of Brown University, shares his views.
-
NIST: Use Cloud to Repel DDoS Attacks
22/10/2012Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST's Matthew Scholl.
-
Transparency Key after Cyberattack
19/10/2012Top executives must be transparent with their stakeholders when their IT systems get attacked. Otherwise, their enterprises' reputations could be more severely damaged, says IBM Fellow Luba Cherbakov.
-
DDoS Attacks: How to Reduce Your Risks
17/10/2012Download the transcript of this interview in PDF format (sponsored by Corero Network Security) As DDoS attacks on banks continue, institutions can take immediate steps to lessen the impact on customer experience and reduce fraud risks. Jason Malo of CEB TowerGroup offers insight.
-
The 'Evil 8' Threats to Mobile Computing
16/10/2012As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
-
Risk Assessments: Expert Advice
11/10/2012Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
-
Infosec: One Step Forward, One Step Back
08/10/2012As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
-
Lacking a Gut Feeling for Cybersecurity
04/10/2012The gut feeling many people have about their physical security hasn't quite developed in the digital world, presenting a challenge for homeland security officials, says State of Delaware Homeland Security Adviser Kurt Reuther.
-
RSA Warns of New Attacks on Banks
04/10/2012A cybergang threatens a blitz of Trojan attacks aimed at 30 U.S. banks, according to RSA. What steps should all banking institutions take now to prepare? RSA's Mor Ahuvia offers insight and advice.
-
Windows 8: A Security Upgrade?
03/10/2012Windows 8 is coming soon. What are the security updates in Microsoft's new operating system? Which questions should security leaders weigh before upgrading? Forrester's Chenxi Wang offers insight.
-
Fine Tuning Data Breach Notification Law
01/10/2012Connecticut Attorney General George Jepsen says he hopes an update to the state's data breach protection law that took effect Oct. 1 will help make its enforcement less difficult.
-
On the Job Training for ISOs
28/09/2012Delaware Chief Security Officer Elayne Starkey leads, but does not supervise, hundreds of information security officers, many of whom have technical expertise in areas other than security.
-
Cyberthreats: What's Next?
28/09/2012Earlier this year, Bill Wansley of Booz Allen Hamilton warned of nation-state attacks against U.S. banks. Are his predictions now coming true? What should institutions expect in weeks ahead?