Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Ransomware: Why Rapid Detection Is So Critical
24/07/2018Recent ransomware attacks against healthcare organizations and others demonstrate why rapid detection is critical to limiting the malware's damage, says cybersecurity expert Bill Dixon of Kroll.
-
Preparing for 3-D Secure: The Next Generation
23/07/2018Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.
-
SamSam: Inside One of the World's Top Forms of Ransomware
23/07/2018Since 2015, Sophos has investigated the SamSam ransomware campaign, and it has just released its findings in a new report. What can you learn from SamSam attackers' unique tools, techniques and protocols? Chester Wisniewski of Sophos shares insight.
-
Trump's Views on Russian Election Meddling: A History
20/07/2018This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
-
A New Effort to Draft Medical Device Cybersecurity Guidance
19/07/2018An advisory group that includes a diverse array of members will spend the coming months devising detailed guidance on how to address the "shared responsibility" of medical device cybersecurity, explains Greg Garcia, who is leading the initiative.
-
Using Blockchain to Support a New Approach to ID Management
18/07/2018Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity."
-
Server Security: The Need for Deep Learning and Anti-Exploit
17/07/2018Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.
-
'Time for US Cyber Command to Take the Gloves Off'
13/07/2018In the wake of news that 12 additional Russians have been indicted for conspiring to interfere with the 2016 presidential election, a key question emerges: What will President Trump say when he meets Monday with Russian President Vladimir Putin? Carbon Black's Tom Kellermann offers analysis.
-
Analysis: California's Groundbreaking Privacy Law
13/07/2018The latest edition of the ISMG Security Report features a discussion of California's groundbreaking new privacy law as well as an update on the potential impact of the hacker group responsible for the Ticketmaster breach.
-
Bringing Vendor Risk Management to the Midmarket
09/07/2018A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his perspective on converting standards to practices.
-
Why California's New Privacy Law Is a 'Whole New Ballgame'
09/07/2018While California already had some of the strictest and most varied privacy laws in the country, the new California Consumer Privacy Act of 2018 "is a whole new ballgame," says privacy attorney Kirk Nahra, who explains why.
-
Cryptocurrency's Skyrocketing Money Laundering Problem
06/07/2018Leading the latest edition of the ISMG Security Report: CipherTrace CEO Dave Jevans discusses recent research on cryptocurrency money laundering and whether regulation is possible. Plus, California passes a new privacy law.
-
Cryptocurrency Laundering's Explosive Growth
03/07/2018Cryptocurrency money laundering is increasing dramatically, being already three times greater than in 2017. And we're only half way through the year, observes Dave Jevans, Founder and CEO of CipherTrace, and chairman of the Anti-Phishing Working Group.
-
Big Data: Understanding the Privacy, Security Risks
29/06/2018What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.
-
Should Healthcare Companies Ever be Data Brokers?
29/06/2018Leading the latest edition of the ISMG Security Report: ISMG's Managing Editor, Security and Technology, Jeremy Kirk, details Australia's HealthEngine caught in a data-sharing fiasco.
-
Case Study: Protecting Electronic Medical Records
27/06/2018Virtualization and microsegmentation are helping to better protect electronic medical records and other critical systems at Nebraska Medicine, says the health system's CIO, Brian Lancaster.
-
A CIO on Carrying the Burden of Medical Device Cybersecurity
26/06/2018A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.
-
Behavioral Analytics and the Insider Threat
26/06/2018Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.
-
Identity Protection: Overcoming Hurdles
26/06/2018Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.
-
Threat Hunting: How to Evolve Your Incident Response
25/06/2018Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,