Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Firewalls: The Next Generation
17/11/2011Too many of today's firewalls are out of date and exposing organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
-
Identifying Infosec Jobs, Skills, Tasks
15/11/2011NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.
-
BYOD and Corporate Policy
15/11/2011Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.
-
Community Service: How to Give Back
08/11/2011Giving back to the community. It's a civic responsibility, says Dan Waddell of Tantus Technologies. But it's also a necessity to help raise cyber awareness. Waddell explains how security pros can give back.
-
Web Apps: The Top Vulnerabilities
03/11/2011ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
-
Cyber Intel Employs Risk Approach
01/11/2011Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.
-
Digital, Physical Security Synergized
31/10/2011Honolulu CIO Gordon Bruce, bolstered by an international conference, is working energetically to expand digital and physical security.
-
ID Theft: How to Help Consumers
31/10/2011ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.
-
Fighting Fraud: Banks, Merchants Must Align
28/10/2011The only way to improve card security is for banks and merchants to align their strategies, says Gray Taylor of NACS. "This is something that hurts both of our industries. Fraud hurts us all."
-
VA's Plan for Mobile Device Security
20/10/2011Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
-
How Audits Can Increase Infosec Budgets
19/10/2011Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
-
BlackBerry Episode Strikes at IT Security Tenet
13/10/2011Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.
-
The App Sec Pro and the Shark
13/10/2011When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
-
Barriers Stunting Cloud Adoption
07/10/2011Alastair MacWillson says the lack of harmonization among state, national and international security laws and regulations has proved challenging for global organizations that want to work in the cloud.
-
Cloud Computing: Compliance Challenges
05/10/2011Too many organizations overlook regulatory compliance issues when working with cloud computing vendors, says security expert Alastair MacWillson.
-
Interview: The New HIPAA Enforcer
03/10/2011Leon Rodriguez, the new director of the Department of Health and Human Services' Office for Civil Rights, describes his HIPAA enforcement agenda.
-
Business Continuity: What We're Missing
03/10/2011From the earthquake in Japan to Hurricane Irene in the U.S., organizations worldwide have found their business continuity and disaster plans tested. But what lessons must we draw from these incidents?
-
7 Steps to Secure Mobile Devices
30/09/2011Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
-
PCI: Merchants Still Fall Short
28/09/2011Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
-
Taking Charge of Physical, IT Security
26/09/2011Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.