Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Using Mobile to Authenticate
13/06/2012Organizations looking to leverage multi-factor authentication should consider mobile devices for their unique capabilities, says Sarah Fender of PhoneFactor.
-
The Move to Data-Centric Security
13/06/2012The attack space is changing, with more enterprise users accessing data from their mobile device, leading to a new focus on data-centric security, says Jeremy Stieglitz of Voltage Security.
-
A Rise in Encryption?
13/06/2012A dramatic reduction in processing requirements for encryption may mean increased utilization of the technology, says Todd Thiemann of Vormetric.
-
Big Data: It's Not About Size
12/06/2012Big data isn't about size, says Gartner's Neil MacDonald. It's much bigger: Big data is about volume, velocity, variety and complexity, and requires new approaches on how information is used to secure digital assets.
-
Lessons from LinkedIn Breach
12/06/2012In the wake of the LinkedIn breach, what steps should organizations take to enhance online password protection? Araxid's Brent Williams offers advice.
-
Creating a Malware Intel Sharing System
12/06/2012Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.
-
Employing Cybersecurity Index as a Metric
04/06/2012IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.
-
Five Application Security Tips
30/05/2012Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
-
Understanding Electronically Stored Info
29/05/2012For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?
-
Why Boards of Directors Don't Get It
24/05/2012IT risk management, cyber insurance, privacy - these are hot topics for security leaders, but not for their boards of directors. Why do senior executives still fail to see IT risks as business risks?
-
How to Respond to Hacktivism
23/05/2012Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
-
Intelligent Defense Against Intruders
23/05/2012Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
-
Matching Personalities to Jobs
18/05/2012Do you have the right personality type to flourish in an IT security role? Laurence Shatkin, author of "50 Best Jobs for Your Personality," offers tips for finding the job that truly fits your type.
-
Risks of False Credentials
14/05/2012How common are padded resumes like the one that led to the departure of Yahoo CEO Scott Thompson? Far too common, says attorney Les Rosen, who offers tips to help organizations manage such risks.
-
Improving Breach Investigations
11/05/2012When breaches occur, most organizations struggle to collect the right data and get investigations off the ground. How can breach response improve? Verizon's Chris Novak offers expert advice.
-
How to Spot a Fraudster
09/05/2012Who is more likely to commit fraud in your organization - the newly-hired youngster or the long-tenured veteran? The ACFE's new 2012 Global Fraud Study profiles the top fraudsters and their schemes.
-
Americans Less Jittery About Net Security
09/05/2012Americans express a bit less anxiety about their security than they felt a year ago, perhaps because they've become desensitized by extensive news reports about cyberattacks last spring, says Unisys' Steve Vinsik.
-
Key Characteristics of Influential CISOs
07/05/2012A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.
-
'It's a War for Talent'
03/05/2012The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.
-
Social Engineering: The Next Generation
03/05/2012Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.