Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Managing Third-Party Risks to Prevent Breaches
02/11/2017To help prevent breaches caused by third parties, organizations need to improve their vendor risk evaluation methods, carefully assessing their business partners' processes and risk mitigation methods, says Anuj Tewari, CISO of HCL Technologies.
-
IoT Devices: A Security-By-Design Approach
01/11/2017As the explosive growth of the internet of things continues, it's essential to take a structured approach to implement security-by-design with secure coding and end-to-end encryption of data, says Mumbai-based Juergen Hase, CEO of Unlimit, the IoT business unit of the Reliance Group.
-
Jennings Aske on Getting Serious About Medical Device Security
31/10/2017Jennings Aske, CISO of New York-Presbyterian, says the healthcare sector is still struggling to figure out medical device security and contends that federal regulations have not been helpful in making it a priority.
-
WannaCry: A Fresh Perspective on the Ransomware Attack
31/10/2017The latest edition of the ISMG Security Report leads with an analysis of a British parliamentary probe into the WannaCry ransomware attack on England's National Health Service. Also featured: a discussion of cyber threats posed by outdated industrial systems.
-
Proactive Defense Against Phishing
31/10/2017When it comes to warding off phishing attacks, too many organizations are reliant on internal awareness campaigns. But a more proactive defense and controls are needed, says John "Lex" Robinson of PhishMe.
-
Which Insurance Would Cover a Breach-Related Injury?
30/10/2017Litigation attorney Patricia Carreiro offers an analysis of whether malpractice or cyber insurance coverage - or neither - would come into play if a patient was injured as a result of a cyberattack against a healthcare entity, including an assault targeting a medical device.
-
How a Medical Device Vulnerability Can Compromise Privacy
27/10/2017Medical device cybersecurity scrutiny usually focuses on potential patient safety issues. But vulnerabilities identified in a cardiac pacemaker programming device illustrate the risks also posed to patient data privacy, says Billy Rios, a researcher who discovered the problem.
-
Understanding the Malware-as-a-Service Commodity Market
27/10/2017Malware is widely available in an "as-a-service" model on the cybercriminal underground to anyone with criminal intent and a bit of money, says John Shier, senior security adviser at Sophos, who explains exactly how the model works in this in-depth interview.
-
The Equifax Data Breach: A UK Perspective
27/10/2017The latest ISMG Security Report features highlights from last week's panel discussion at the ISMG Fraud and Breach Prevention Summit in London on the implications of the Equifax data breach.
-
Medical Device Security: What Really Works?
24/10/2017A new collaborative effort aims to advance "evidence-based security" for medical devices through the sharing of best practices, says Dale Nordenberg, M.D., leader of the Medical Device Innovation, Safety and Security consortium.
-
Is Digital Transformation a Security 'Disaster'?
24/10/2017Is digital transformation an impending "disaster" - leaving more attack surfaces open to exploit and putting enterprises at further risk? Or is there a chance to rewrite how the security department operates? Former Burberry CISO John Meakin shares his views.
-
Warning of Increased Attacks on the Energy Sector
24/10/2017DataBreachToday Executive Editor Mathew J. Schwartz's examination of the growing threats facing the critical energy sector leads the latest edition of the ISMG Security Report. Also in this report: A discussion of safeguarding the telehealth marketplace.
-
DMARC: A Close Look at the Email Validation System
20/10/2017An in-depth look at the DMARC anti-spoofing system - which the U.S. Department of Homeland Security this past week said it will require federal agencies to adopt - leads the latest edition of the ISMG Security Report. Also, continuous monitoring of the insider threat.
-
Fighting the Insider Threat: A Long-Term Battle
18/10/2017To be successful, the quest to mitigate insider threat risks must start at the time employees are hired and continue as they move into different positions requiring varying degrees of data access, says Suzanne Widup of Verizon Enterprise Solutions.
-
Profiling DHS Secretary-Designate Kirstjen Nielsen
17/10/2017A look at President Donald Trump's pick for the Department of Homeland Security secretary, Kirstjen Nielsen, leads the latest edition of the ISMG Security Report. Also featured: Equifax's and TransUnion's problem with dubious code.
-
RSA Conference Abu Dhabi: A Preview
16/10/2017The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
-
As Telehealth Grows, So Do Privacy, Security Concerns
13/10/2017With telehealth on the cusp of rapid growth, healthcare entities must carefully assess and address critical privacy and security issues, says regulatory attorney Emily Wein.
-
A Conversation With the Cyber Gang 'The Dark Overlord'
13/10/2017A discussion with ISMG Security and Technology Editor Jeremy Kirk about his chat with the cyber gang "The Dark Overlord," which threatened some U.S. school districts with extortion, leads the latest edition of the ISMG Security Report. Also, an update on surging IT security employment.
-
Data: How to Secure Your Greatest Asset
11/10/2017It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
-
Redefining the Role of HHS CISO
10/10/2017Congress needs to elevate the position of the CISO at the Department of Health and Human Services so that the job not only has responsibilities within the agency but also an official role in helping the healthcare sector improve its cybersecurity, says Samantha Burch of HIMSS.