Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Why Cybercrime Is On the Rise; Update on Threat Info Sharing
30/09/2016The latest ISMG Security Report leads off with a discussion with DataBreachToday Executive Editor Mathew J. Schwartz on why online cybercrime is growing. Also, the status of the U.S. government's cyberthreat information sharing initiative.
-
Mitigating Fraud Risks for Same-Day ACH
28/09/2016In the wake of this week's rollout by NACHA, The Electronic Payments Association, of same-day ACH payments in the U.S., fraud departments at originating and receiving banks should be bracing for the new risks posed by faster payments, says NACHA's Jane Larimer, who offers insights on steps to take.
-
Research Reveals Why Hacked Patient Records Are So Valuable
27/09/2016Why are hacked healthcare records so valuable? It's because stolen patient records often end up for sale on the deep web as part of information packages called "fullz" and "identity kits" used by fraudsters to commit a wide variety of crimes, says James Scott of the Institute for Critical Infrastructure Technology.
-
Cloud Security Paradigm: Time for Change?
27/09/2016Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
-
Why Hashed Passwords Aren't Implemented Correctly
27/09/2016The latest ISMG Security Report leads off with a segment in which Managing Editor Jeremy Kirk explains that the massive Yahoo breach not only exposed the accounts of a half-billion customers, but also the weaknesses in the way enterprises employ hashed passwords.
-
Why CISOs Must Make Application Security a Priority
26/09/2016As pressure to speed the development of applications intensifies, CISOs must be the "voice of reason," taking a leadership role in ensuring security issues are addressed early in app development process, says John Dickson, principal at Denim Group, a Texas-based security consultancy.
-
Achieving Resilient Cybersecurity
26/09/2016In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture. Michael Kaczmarek of VeriSign describes how to achieve this resiliency.
-
Yahoo's Mega Breach: Security Takeaways
24/09/2016Security expert Sean Sullivan isn't surprised that the massive 2014 breach of Yahoo, which exposed at least 500 million account details, only recently came to light. Here's why, as well as what users must learn from this breach.
-
The Malware Threat Grows: So Now What?
23/09/2016Given the rapid spread of malware and difficulties with detection, what actions should organizations take? In this interview, Chris Novak of Verizon and Stephen Orfei of the PCI Security Standards Council offer insights.
-
Typical Cost of a Data Breach: $200,000 or $7 Million?
23/09/2016In this latest edition of the ISMG Security Report, you'll hear an explanation why estimates from the Ponemon Institute and The Rand Corp. on typical enterprise data breach costs vary so widely. Also, analyses of a car hack, SWIFT's latest initiative to help banks mitigate fraud and the Yahoo breach.
-
Why Is Ransomware So Successful?
20/09/2016Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes, CTO at Trend Micro.
-
Aligning Cyber Framework with Organization's Strategy, Goals
20/09/2016A report on a new self-assessment tool that's intended to show whether an enterprise's cyber-risk initiative aligns with its goals and strategy leads the latest edition of the ISMG Security Report.
-
Helping Police Solve Cybercrimes
19/09/2016Because many law enforcement agencies lack cybercrime expertise, it's important for companies that have been attacked to provide as much technical and forensic information as possible to authorities to help ensure that investigations lead to arrests and prosecutions, a panel of experts says.
-
Safeguarding Data from Politically Motivated Breaches
16/09/2016The recent hacker attack targeting the drug records of Olympic athletes, as well as other breaches involving high-profile targets, highlight the challenges involved in protecting sensitive data from external attackers or malicious insiders driven by political and other causes, says security expert Sean Curran.
-
ISMG Summit Wrap Up: Data Complexity Facilitates Cyber Risk
16/09/2016A roundup of the just-concluded ISMG Fraud and Breach Prevention in Toronto leads the latest edition of the ISMG Security Report. Also, how one CISO gets his security message across to the board and the challenges CISOs face during their first 100 days on the job.
-
Security Investments Shifting to Detection and Response
14/09/2016The paradigm shift in security from prevention to detection and response has finally arrived in Asian markets, says Sid Deshpande, Gartner principal analyst, who shares insights on 2016 trends.
-
Senator Seeks Probe of Bank Over Privacy Violations
13/09/2016Bank watchdog Sen. Elizabeth Warren is going after Wells Fargo for violating the privacy of bank customers. This news leads the latest edition of the ISMG Security Report.
-
A CISO's First 100 Days
09/09/2016The first 100 days on the job can be daunting for security leaders as they work toward understanding the organization's posture, while at the same time defending it around the clock. Gartner's Tom Scholtz shares insights on meeting key milestones.
-
Does Donald Trump Understand Cybersecurity?
09/09/2016An analysis of U.S. Republican presidential candidate Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, the U.S. federal government gets its first chief information security officer.
-
Why Healthcare Needs to Standardize Threat Info Sharing
08/09/2016Cyber threat information sharing in the healthcare sector urgently needs to be standardized so organizations can take appropriate action based on the intelligence, says Jeffrey Vinson, CISO of Harris Health System, who discusses findings emerging from ongoing federally funded research.