Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
The Return of the Luddite: Securing Critical Systems
23/06/2017The latest edition of the ISMG Security Report leads off with a look at why organizations turn to paper when critical systems can't be secured. Also, how to hack air-gapped systems over the internet.
-
Making Forensic Investigations More Fruitful
20/06/2017Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
-
'Eulogizing' Neutrino Exploit Kit
20/06/2017Writing the obituary for the lifeless Neutrino exploit kit leads the latest edition of the ISMG Security Report. Also, judging the value of the Department of Health and Human Services' wall-of-shame website of healthcare sector breaches.
-
Defending Against Health Data Breaches: What's Missing?
19/06/2017Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
-
Analysis: Strategic Cybersecurity Investments Study
19/06/2017Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior. But only 29 percent are very confident in their security controls. Neustar's Tom Pageler analyzes results of Strategic Cybersecurity Investments Study.
-
Hardening the Workforce: Developing Cyber Defenses
18/06/2017Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
-
How WannaCry Survives
16/06/2017The CEO of the company that crippled WannaCry's ransomware component explains to Congress how the worm continues to attack unpatched systems at increasing rates. Also, creating a healthcare cybersecurity framework.
-
App Security: Breaking Bad Habits
13/06/2017Bad security habits of consumers whose use of apps is skyrocketing is leading to increased risks for businesses as they ramp up their use of apps as well, says Neil Wu Becker, a global vice president at A10 networks, who emphasizes the need to enforce best practices.
-
The Myth of the Secure Mainframe
13/06/2017A report on security flaws found in mainframe computers leads the latest edition of the ISMG Security Report. Also, the tale of how a hacker launched his career; insights on new EU data protection regulations.
-
The Confusing Marketplace of IT Security Wares
09/06/2017A discussion that explores the predicament many information security managers face when deciding which security technologies to buy in a glutted market leads the latest edition of the ISMG Security Report. Also: An update on cyber flaws in connected vehicles and the latest from Infosecurity Europe.
-
Analysis: FFIEC's Update to Cyber Assessment Tool
07/06/2017A just released update to the FFIEC's Cybersecurity Assessment Tool helps make meeting regulators' demands for "baseline" cybersecurity more attainable, says Amy McHugh, a bank adviser and former IT examination analyst for the Federal Deposit Insurance Corp.
-
Balancing Act: Constant Battle Between Functionality, Security
06/06/2017A discussion analyzing the difficulty of striking a balance between IT functionality and cybersecurity leads the latest edition of the ISMG Security Report. Also featured: Updates on sizing up weaknesses in biometrics and the potential to exploit LED lights to leak sensitive data from routers.
-
Analysis: Evolving Russian Cyber Threats
02/06/2017The latest ISMG Security Report focuses on evolving Russian cyber threats, including manipulating hacked documents as part of a disinformation, cyber-espionage campaign.
-
The Need for Cyber ISR
01/06/2017It's a tried and true military tradition: ISR, or Intelligence, Surveillance and Reconnaissance. But the practice is gaining traction in enterprises as well, and especially within cybersecurity, says Christopher Cleary of Tenable Network Security.
-
Medical Devices: Care Benefits vs. Cybersecurity Risks
31/05/2017In an in-depth interview about a new study that identifies thousands of vulnerabilities in cardiac devices, security researcher Billy Rios calls on manufacturers to more carefully consider the compromises they make in balancing the usability benefits to patient care versus the cybersecurity risks.
-
21st Century Cures Act: Will It Revamp Health Data Exchange?
30/05/2017The 21st Century Cures Act presents a number of critical but challenging issues pertaining to the advancement of nationwide secure health information exchange that federal regulators must address, David Kibbe, M.D., president and CEO of DirectTrust, explains in this in-depth interview.
-
Cybersecurity During the Era of Donald Trump
30/05/2017In this special edition of the ISMG Security Report, you'll hear an edited version of an ISMG Fraud and Breach Prevention Summit keynote panel in which current and former federal cybersecurity officials assess the IT security agenda of the Donald Trump administration.
-
Homeland Security Secretary John Kelly on Battling WannaCry
26/05/2017Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses as well as big data and machine learning combining to secure IT.
-
Protecting Medical Devices from Ransomware: A Critical Step
25/05/2017Healthcare entities need to take a critical step right now to prevent their medical devices from being affected by the next major ransomware attack, says cybersecurity expert Kevin Fu.
-
How to Prepare for the Next WannaCry
24/05/2017The WannaCry ransomware outbreak was a huge "wake-up call" for the global information security community, says Dan Schiappa of Sophos. It's time to patch those legacy systems and prepare for the inevitable next big crimeware scare, he says.