Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
How to Prepare for the Next WannaCry
24/05/2017The WannaCry ransomware outbreak was a huge "wake-up call" for the global information security community, says Dan Schiappa of Sophos. It's time to patch those legacy systems and prepare for the inevitable next big crimeware scare, he says.
-
Stress-Busting Through Vulnerability Risk Management
24/05/2017The WannaCry ransomware outbreak showcases the problem: Security pros are overwhelmed by vulnerabilities that could be simple to mitigate, if only they had the right info at the right time. Humphrey Christian of Bay Dynamics discusses how to improve vulnerability risk management.
-
Why Big Data, Machine Learning Are Critical to Security
23/05/2017Big data and machine learning will play increasingly critical roles in improving information security, predicts Will Cappelli, a vice president of research at Gartner, who describes the reasons why.
-
HSBC Experiences Voice Biometrics Telephone Banking Fail
23/05/2017Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
-
A Strategy for Fighting Multichannel Attacks
19/05/2017Information security and fraud departments at financial institutions need to improve their collaboration to help fight multichannel cyberattacks, say John Buzzard and Paul Love of CO-OP Financial Services.
-
US Congress Picks Up Pace on Cybersecurity Legislating
19/05/2017Reports on how the U.S. Congress is taking steps to toughen cybersecurity lead the latest edition of the ISMG Security Report. Also, an analysis of a Government Accountability Office study on the IoT landscape and the security threats facing the internet of things.
-
Beyond Patch Management: Ransomware Mitigation Strategies
19/05/2017Beyond improving their patch management practices, what else can organizations do to avoid falling victim to ransomware attacks such as WannaCry? Security expert Doug Copley offers advice.
-
Assistant to the President Makes Bold Cybersecurity Declaration
16/05/2017The words of Assistant to the President Thomas Bossert, who boldly pledges to outdo previous administrations on improving federal government cybersecurity, lead the latest edition of the ISMG Security Report. Also, Microsoft's exasperation with the NSA over WannaCry ransomware.
-
Why Reputational Risk Management Matters
15/05/2017When it comes to breach preparation, it isn't just about protecting IT assets. Increasingly, the conversation is about reputational risk management, says Jacob Olcott of BitSight Technologies.
-
Responding to WannaCry Ransomware Outbreak
12/05/2017As organizations worldwide rush to mitigate the outbreak of the WannaCry crypto-locking ransomware, Adam Meyers of CrowdStrike shares insights on what researchers have gleaned from the attacks and how organizations should respond.
-
FDA Ramping Up Digital Health Cybersecurity Efforts
12/05/2017The Food and Drug Administration will soon launch a new centralized digital health unit that will address the cybersecurity of medical device software, Bakul Patel, who is overseeing the effort, explains in this in-depth interview.
-
Re-evaluating InfoSec Awareness' Place in Security Arsenal
12/05/2017An analysis on rethinking where awareness programs fit in cyberdefense strategies leads the latest edition of the ISMG Security Report. Also, James Comey's cybersecurity legacy at the FBI.
-
The Maturation of Cybercrime
09/05/2017An examination of the maturing of cybercrime leads the latest edition of the ISMG Security Report. Also, understanding the Intel Active Management Technology flaw.
-
2 Days to 2 Hours: Automating Application Vulnerability Management
09/05/2017Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Listen and learn how.
-
Deception Technology: A Primer
06/05/2017Security practitioners are debating the role deception technologies can play in a security strategy. But how does the latest technology actually work? Sahir Hidayatullah, CEO and co-founder of Smokescreen Technologies, offers some insights.
-
FBI's James Comey on Insider Threat, Other Cyber Challenges
05/05/2017The latest ISMG Security Report leads with an account of FBI Director James Comey's testimony before the U.S. Congress on insiders posing a cyberthreat to the American law enforcement bureau. Also, dissecting the claim that most startups fail shortly after being victimized by a cyberattack.
-
Ransomware Attacks on Medical Devices: The Outlook
03/05/2017As ransomware assaults in the healthcare sector continue to rise, it's a matter of time before medical devices are impacted, says healthcare security expert Axel Wirth of Symantec, who analyzes the risks.
-
CISO in the Middle: Managing Risk Up and Down the Enterprise
02/05/2017When it comes to cyber risk, how must the CISO manage communications across the enterprise? The board, the staff and the line-of-business leaders all have different needs. Humphrey Christian of Bay Dynamics offers advice for the CISO in the middle.
-
Hackers Target Small Firms as Big Biz Toughens Cyber Defenses
02/05/2017An analysis on why small businesses are increasingly being targeted by hackers leads the latest edition of the ISMG Security Report. Also, potential medical device hacks pose risk to patients, and payment fraud evolves as the threat landscape intensifies.
-
Saber-Rattling and Cybersecurity: The Connection
01/05/2017So far this year, we've seen heightened tensions between the U.S. and adversaries in Russia, North Korea and Iran. How do these tensions manifest on the cyber stage? Tom Kellermann of Strategic Cyber Ventures talks about the cyberwar risks brewing below the surface.