Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Ransomware: 'To Pay or Not to Pay' Question Faces Medibank

    04/11/2022

    The latest edition of the ISMG Security Report discusses how Australian health insurer Medibank is deliberating on whether to pay a ransom to extortionists, analyzes the growing number of layoffs in the security vendor space, and shares a tribute to threat intelligence researcher Vitali Kremez.

  • Authentication in Pharma: Protecting Lifesaving Secrets

    27/10/2022

    It's no secret: As pharmaceutical companies develop new health treatments, adversaries seek to steal or sabotage their intellectual property. This dynamic adds extra urgency to authentication. Tom Scontras of Yubico talks about how the pharma sector approaches authentication.

  • Healthcare and Authentication: Achieving a Critical Balance

    27/10/2022

    Security and ease of use: It is one thing for nonhealthcare entities to debate these merits of new authentication in solutions. But in healthcare, where the decisions directly affect patient safety, the stakes are critical. Tom Scontras of Yubico talks about how healthcare approaches authentication.

  • The Battle Against Phishing Attacks and Similar Scams

    21/10/2022

    Many entities fight an uphill battle against increasingly clever phishing and related scams that lead to serious data compromises, say former CIA analyst Eric Cole and former Department of Justice Assistant Attorney General David Kris, who are both advisers at security firm Theon Technology.

  • Critical Security Considerations for Medical Devices

    20/10/2022

    Too many medical device makers don't pay close attention to the fine details and features of their product designs to ensure they are safe and secure, says Naomi Schwartz, a former product reviewer at the Food and Drug Administration and current cybersecurity adviser at security firm MedCrypt.

  • Russian-Speaking Ransomware Gangs Hit New Victim: Russians

    20/10/2022

    The latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target, offers the latest on Australia's data security reckoning and the government’s response, and outlines emerging trends in customer identity and access management.

  • Examining the Effects of Cyberattacks on Patient Care

    19/10/2022

    Cyberattacks on healthcare entities result in poor patient outcomes, including delayed procedures and even a rise in mortality, according to a recent survey conducted by research firm the Ponemon Institute. Ryan Witt of Proofpoint, which sponsored the study, discusses the findings.

  • Online Tracking Tools Provoke Patient Privacy Concerns

    18/10/2022

    A study by data privacy firm Lokker found thousands of healthcare providers deploying Facebook Pixel and other similar tracking tools. Those trackers reveal "medical and other data that consumers don't know is being tracked and haven't authorized," says Ian Cohen, Lokker's chief executive officer.

  • Top Cyber Lessons From Natural Disaster Plans in Healthcare

    17/10/2022

    Plan for a ransomware attack the same way you plan for a hurricane, says Paige Peterson Sconzo, director of healthcare services at security firm Redacted Inc. A cyber incident capable of disrupting network connectivity requires careful thinking about how to revert to the pre-internet era.

  • Most Concerning Security Vulnerabilities in Medical Devices

    14/10/2022

    Security flaws in a vital signs monitoring device from a China-based manufacturer could allow hackers to launch an attack that spreads to all other devices connected to the same network. This is among the most serious security issues involving medical devices, says Jason Sinchak of Level Nine.

  • Yotam Segev on What Distinguishes Cyera From Traditional DLP

    13/10/2022

    CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.

  • The Growing Zelle Fraud Problem and Who Should Pay for It

    13/10/2022

    The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.

  • The Challenges of Kubernetes and Cloud Containers

    10/10/2022

    In this episode of "Cybersecurity Unplugged," as the use of Kubernetes and cloud containers over traditional forms of storage continues to increase, Nikki Robinson of IBM discusses the benefits of breaking down "complicated environments into something that's tangible and easy to manage."

  • How Adversaries Are Bypassing Weak MFA

    07/10/2022

    The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.

  • The Ransomware Files, Episode 12: Unproven Data Recovery

    07/10/2022

    What if you were hired for an office job but ended up negotiating with cybercriminals? There aren’t many rules around ransomware, but this is a story about one rule that was definitely broken. By the end, the path to the truth led to a place on the other side of the world where no one wanted to be.

  • How to Deal With Endemic Software Vulnerabilities

    05/10/2022

    In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.

  • Passwords Are Unfit - So Why Do We Still Have Them?

    03/10/2022

    Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.

  • Cyberwar: Assessing the Geopolitical Playing Field

    29/09/2022

    The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.

  • Examining What Went Wrong for Optus

    29/09/2022

    The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.

  • It's 2022. Do You Know Where Your Old Hard Drives Are?

    22/09/2022

    The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.

página 14 de 174