Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Why Merchants Object to Visa's EMV Debit Routing Rules
21/11/2016Retail groups are asking Visa to clarify how it plans to level the playing field for EMV adoption in the U.S. - especially for routing EMV debit payments. In an interview, Mark Horwedel of the Merchant Advisory Group explains MAG's objections to Visa limiting merchants' transaction options for debit payments.
-
New Way to Build Secure Trustworthy Systems
18/11/2016Highlighting the latest ISMG Security Report: National Institute of Standards and Technology's Ron Ross explains how a new approach employing engineering principles can be used to build secure, trustworthy systems. Also, when a ransomware attack is deemed a breach.
-
How and When Will Trump Tackle Healthcare IT Reforms?
15/11/2016An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
-
Did Weak InfoSec Sway Election?
11/11/2016The breach of Democratic Party computers led to the release of a trove of emails embarrassing to Hillary Clinton that might have swayed the election. Should the IT security community fess up? Also, top government cybersecurity policymakers assess President-elect Donald Trump as an IT security influencer.
-
Obama's Cyber Review Leader on What's Ahead for Trump
09/11/2016Donald Trump pledges to conduct a review of U.S. cyber defenses and vulnerabilities as one of his first acts as president. Melissa Hathaway, who led a similar review for Barack Obama nearly eight years ago, says it's important for an incoming president to get the lay of the land.
-
New Tools Aim to Close the Cybersecurity Skills Gap
08/11/2016Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known as CyberSeek; the other is updated guidance known as the NICE Cybersecurity Workforce Framework. In this audio report, NICE Director Rodney Petersen explains the connection between the two.
-
The Kim Kardashian Security Wake-Up Call
08/11/2016Thank Mark Zuckerberg's taped-over webcam and the Paris robbery of Kim Kardashian West for waking up the average consumer to the security risks they face from using technology and social media, social engineering expert Sharon Conheady says in this audio interview.
-
How FBI Quickly Reviewed 650K Emails on Clinton Aide's PC
08/11/2016An explanation of how the FBI likely was able to quickly review 650,000 emails found on a computer shared by a top aide to Democratic Party presidential nominee Hillary Clinton leads the latest ISMG Security Report. Also, this week's ISMG Fraud and Breach Prevention Summit in London is previewed.
-
The Challenge of Defending the Domain Name System
07/11/2016The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
-
Clinton Email Investigation: A Forensics Perspective
07/11/2016How did the FBI likely approach its examination of the computer of Hillary Clinton's close aide Huma Abedin to determine if it contained classified materials? Forensic expert Rob Lee explains just how such an examination occurs.
-
Moving to Office 365: The Security Concerns
07/11/2016As organizations prepare to transition to Microsoft Office 365, what should be their top security concerns - and how should they address them? Symantec's Deena Thomchick offers insight and tips.
-
Cyberattacks Pose Threat to Presidential Election
04/11/2016The latest ISMG Security Report features a special report on potential cyber threats that could damage the integrity of the U.S. presidential election. Also, an analysis of the harm caused by Australia's largest breach of personal information.
-
Inside the Cerber Ransomware-as-a-Service Operation
03/11/2016The ransomware-as-a-service operation known as Cerber is earning at least $200,000 per month via ransoms paid by victims, says Check Point Software Technologies' Gadi Naveh. In an audio interview, he explains that bitcoins and high levels of automation are key to the operation's success.
-
Echo from the Past: Security Lessons for IT Modernization
01/11/2016The latest ISMG Security Report kicks off with a bit of history: Comparing the similarities between remediating the year 2000 data problem, known as Y2K, that enterprises faced at the end of the 20th century with today's initiatives to drive IT security by modernizing information systems.
-
Breach Response: Taking a 'Disaster Recovery' Approach
31/10/2016Healthcare organizations should take a disaster recovery approach to creating their breach response plans, says Joey Johnson, CISO of Premise Health, in this audio interview.
-
Automotive CyberSec Guidance Assessed; IBM's DDoS Apology
28/10/2016An evaluation of new U.S. government guidance to prevent the hacking of automotive computers and electronics leads the latest ISMG Security Report. Also, IBM takes responsibility for the impact of a DDoS attack and a preview of the ISMG Healthcare Security Summit.
-
Why Is Healthcare Sector So Vulnerable to Cyberattacks?
27/10/2016What critical factors make the healthcare sector vulnerable to cyberattacks? In this audio interview, CISO Dave Summitt of the H. Lee Moffitt Cancer Center and Research Institute offers insights.
-
New HHS CIO on Emerging Threats, Top Priorities
27/10/2016In an in-depth audio interview, Beth Anne Killoran, the new CIO at the Department of Health and Human Services, outlines top cybersecurity priorities, describes how the agency is recruiting new security talent and outlines efforts to bolster the security of Obamacare's HealthCare.gov website and systems.
-
Healthcare Sector Among Most at Risk from Social Engineering
27/10/2016SecurityScorecard is out with its 2016 Healthcare Industry Cybersecurity Report, and it paints a grim picture about how vulnerable healthcare entities are to socially engineered schemes. CEO Aleksandr Yampolskiy shares insight from the study.
-
At the Eye of the DefenseStorm
26/10/2016Sean Feeney, CEO of DefenseStorm, got his education at West Point. How did his military training prepare him for leadership in technology and cybersecurity organizations? Feeney shares leadership insights in this Executive Sessions interview.