Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Operational Technology: The Next Security Challenge
29/12/2016Now that more breaches are targeting industrial control systems, organizations that have paid little attention to operational technology security must ramp up their protection efforts, says breach response expert Christopher Novak of Verizon.
-
How to Battle IoT Devices Infected with DDoS Malware
28/12/2016With the rise of malware infecting IoT devices, DDoS defenders "have to assume that the attackers have an unlimited supply of machines that they can compromise," says Akamai's Michael Smith. But quarantines, ISP feedback loops and better patch management can bolster defenses.
-
2017: 'Year of the Breach' Redux?
28/12/2016Will more "historical" breaches be revealed in 2017 and beyond? Data breach expert Troy Hunt is optimistic that such revelations will become rare as large businesses operating online continue to improve security. But what about small and mid-size organizations?
-
Cyber Threat Awareness Education: A Priority for 2017
28/12/2016Because cyber threats are becoming increasingly sophisticated, bolstering employee and customer awareness and training about ransomware, phishing and other cyber risks must be a top priority in 2017, says Curt Kwak, CIO of Proliance Surgeons.
-
The Changing Face of Cyber Espionage
28/12/2016Cyber espionage groups are using unconventional channels to hack target organizations, according to Mandiant' s latest research. Trusted service provider relationships are being exploited to compromise organizations in government and defense, says Rob van der Ende, Mandiant's vice president for Asia Pacific and Japan.
-
Threat Intelligence: The Difference Between Good and Bad
27/12/2016Security software often generates so many warnings that it can be difficult to figure out which ones are the most serious. How can one differentiate good intelligence from bad? John Watters, founder of iSight Partners, discusses how to separate the signal from the noise.
-
Special Report: Conversations About Nation-State Adversaries
27/12/2016In this special edition of the ISMG Security Report, DataBreachToday Executive Editor Mathew Schwartz discusses the Russian groups behind damaging hacks against the U.S. and Strategic Cyber Ventures CEO Tom Kellermann details cyberthreats posed by the West's nation-state adversaries.
-
2017 Cybersecurity Predictions: The Impact of Trump Election
26/12/2016Hacks sponsored by nation-states and attacks fueld by IoT-powered botnets are just some of the daunting threats we will see in 2017, says cybersecurity thought leader Tom Kellermann. What are his top predictions, and how should security leaders respond?
-
House Working Group: Encryption Bypasses a Bad Idea
23/12/2016This edition of the ISMG Security Report features an analysis of recommendations by a U.S. House Encryption Working Group that Congress should not enact legislation that requires technology companies to help law enforcement authorities bypass encryption on the devices they manufacture.
-
How Would Restructuring of CFPB Affect Banks?
22/12/2016A federal court recently ruled that the structure of the Consumer Financial Protection Bureau, which is led by a single director, is unconstitutional. Cybersecurity attorney Chris Pierson assesses whether the potential restructuring of the CFPB could have any impact on the bureau's oversight of banks.
-
The Urgent Need to Recruit More Cybersecurity Pros
22/12/2016As cybercriminals continue to wage more sophisticated, well-funded attacks, it's more urgent than ever to attract qualified professionals to careers in cybersecurity, Symantec CTO Dr. Hugh Thompson says in this audio interview.
-
Senators Call for Select Panel to Probe Hacks Said to Sway Vote
20/12/2016Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.
-
Ransomware: Key Elements of Response
19/12/2016Fifty-nine percent of security leaders believe their current ransomware defenses are above average or superior. Yet 53 percent also have been victim of ransomware attacks in the past year. Eduardo Cabrera of Trend Micro discusses this and other results of the Ransomware Response Study.
-
21st Century Cures Act: Analysis of Impact
16/12/2016The impact of the patient data privacy and security provisions of the 21st Century Cures Act, signed into law Dec. 13, will depend, in part, on who is chosen to study key issues and come up with recommendations, says attorney Steven Teppler.
-
Contactless Payments: Addressing the Security Issues
16/12/2016The emergence of contactless chip payments on mobile phones is changing the way transactions are authenticated and secured, Jeremy King of the PCI Security Standards Council explains in this audio interview.
-
Will Hacktivists Launch Attacks to Protest Trump's Presidency?
16/12/2016A report foreseeing homegrown hacktivists showing their displeasure with President-elect Donald Trump by launching cyberattacks against U.S. government sites leads the latest edition of the ISMG Security Report. Also, the details behind the 1 billion-record hack of Yahoo.
-
Breach Attribution and 'Hack Back': Don't Waste Time
14/12/2016Hack attack victims often ask two questions: "Who did it? And can we hack them back?" But after an attack, with time of the essence for blocking further damage, those are the wrong questions for breached organizations to be asking, data breach response expert Alan Brill says in this audio interview.
-
How Can Healthcare Attract Cybersecurity Talent?
14/12/2016The healthcare sector needs to more effectively compete against other industries that are urgently seeking experienced cybersecurity professionals, says Lee Kim of the Healthcare Information and Management Systems Society, who discusses critical steps in this audio interview.
-
New Year, New Threats: 2017 Security Predictions from Malwarebytes
14/12/2016Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories. CEO Marcin Kleczynski offers insight on how to prepare.
-
Security Scorecard: Where Are Consumers Most Engaged?
13/12/2016How much time and effort will consumers put into protecting themselves from identity theft and financial fraud? That was the question posed by Aite Group's Julie Conroy in researching the new Global Security Engagement Scorecard. And the answer might just surprise you.