Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Highlights from the Hearing on Russian Election Interference
31/03/2017Leading the latest edition of the ISMG Security Report: A breakdown of testimony presented at a Senate Select Committee on Intelligence hearing on Russia's attempt to influence the U.S. presidential election. Also, remembering Trend Micro Chief Technology Officer Raimund Genes.
-
What's in Store for HIPAA Under New OCR Leadership?
30/03/2017What's in store for health data privacy and security initiatives in the Trump administration, now that a new leader for the HHS Office for Civil Rights, which enforces HIPAA, has been selected? Healthcare attorney Kirk Nahra, a regulatory expert, offers an assessment.
-
What Motivates Targeted Attacks Today?
30/03/2017As the threat landscape evolves, with risks exposed by newer technologies and commoditization of attack infrastructure, the motives of targeted attackers may also be evolving as they try new ways to influence change in an increasingly digital world.
-
Rise of the Secure Technology Alliance
29/03/2017The former Smart Card Alliance industry group has expanded its mission to include IoT, mobility and other emerging technologies. And it has a new name, too: Secure Technology Alliance. Executive Director Randy Vanderhoof explains the move.
-
Britain's Home Secretary Enters the Encryption Debate
28/03/2017An analysis of British Home Secretary Amber Rudd's call for law enforcement to gain access to encrypted communications services, such as WhatsApp, leads the latest edition of the ISMG Security Report. Also, a preview of ISMG's Fraud and Breach Prevention Summit in San Francisco.
-
Blockchain Seen as a Secure Cyberthreat Info Sharing Tool
24/03/2017A look at experts promoting blockchain as a secure way to share cyberthreat information leads the latest edition of the ISMG Security Report. Also, how sound waves pose a threat to IoT devices, smartphones and medical devices.
-
Why Continuous Vulnerability Assessment Is Essential
24/03/2017With the rapid changes in the threat landscape and the risks introduced by DevOps, the cloud and other new elements, organizations need to have a continuous vulnerability assessment program as a security baseline, says Richard Bussiere of Tenable Network Security.
-
Moving From IT-Driven to Business-Driven Security
21/03/2017Organizations are shifting from an IT-driven to a business-driven approach to information security, with a focus on minimizing business disruption, says Kartik Shahani of RSA.
-
Comey Confirms Probe of Possible Trump-Russia Links
21/03/2017Leading the latest edition of the ISMG Security Report: FBI Director James Comey's revelation of a counterintelligence investigation of possible ties between Donald Trump's presidential campaign and Russia's actions to influence the U.S. presidential election.
-
Re-Thinking IAM and Cybersecurity
21/03/2017A recent study by Forrester Research unveils a direct correlation between data breaches and organizations' IAM immaturity. What needs to change? Corey Williams of Centrify offers strategic advice.
-
Study: Some Mobile Devices Can Be Hacked Using Sound Waves
20/03/2017Some medical devices, smartphones and internet of things gadgets contain certain types of sensors that are vulnerable to potential hacking using sound waves, says cybersecurity researcher Kevin Fu, who calls on manufacturers to address the risks.
-
Trump Budget: $1.5 Billion for DHS Cybersecurity
17/03/2017A look at President Donald Trump's budget blueprint to boost cybersecurity spending in fiscal year 2018 leads the latest ISMG Security Report. Also, Russian agents charged with Yahoo hack; new White House cybersecurity adviser Rob Joyce profiled.
-
Ransomware: The Defender's Advantage
17/03/2017As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
-
Rating the Security Performance of the Fortune 1000
14/03/2017BitSight Technologies has just concluded a new study that rates the cybersecurity performance of Fortune 1000 enterprises. What are the key takeaways? Data Scientist Jay Jacobs shares his analysis.
-
Will NSA's Rob Joyce Be Trump's Top Cybersecurity Adviser?
14/03/2017The latest ISMG Security Report leads with a profile of Rob Joyce, the National Security Agency operative who is reportedly under consideration to be President Donald Trump's top cybersecurity adviser. Also, cybercriminal ties with Russian intelligence and the lifespan of zero-day vulnerabilities.
-
What Can We Learn from HIPAA Settlements?
13/03/2017An important theme that emerges from the HHS Office for Civil Rights' dozens of HIPAA settlements is that all aspects of compliance are critical and subject to close scrutiny by federal regulators, says former OCR director Leon Rodriguez.
-
Mirai Tools Up for Advanced DDoS Attacks
13/03/2017The source code for the Mirai botnet has been updated to launch DDoS amplification/reflection attacks, although so far that capability hasn't been used, says Gary at Arbor Networks. Even so, DDoS defense planning remains essential.
-
Endpoint Security: Creating Order from Chaos
13/03/2017The rapid evolution of malware and proliferation of solutions have created a state of chaos for security leaders, says Naveen Palavalli of Symantec. What strategy and solutions will help restore order to anti-malware defense?
-
Tapping the Potential of AI in Health Data Security
13/03/2017The ability of artificial intelligence to look for patterns in vast data - including large collections of unstructured data - is presenting new potential applications for bolstering the security of patient information, says Navin Budhiraja of Infosys.
-
What's Behind WikiLeaks' Release of CIA Hacking Files
10/03/2017Leading the latest edition of the ISMG Security: A deep dive into the WikiLeaks release of thousands of documents that appear to lay open in detail the CIA's computer hacking techniques Report. Also, tackling the rise of attacks targeting the internet of things.