Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Applying Critical, Systems and Design Thinking to Security
24/09/2021Brian Barnier, a director of analytics who is developing a course on critical and design thinking in cybersecurity for CyberEd.io, is a firm believer in the importance of critical thinking today. He discusses how that, plus systems and design thinking, can improve the way cybersecurity functions.
-
Ransomware Updates: Conti Attacks Rise, New Players Surface
24/09/2021The latest edition of the ISMG Security Report features an analysis of how the U.S. government has been tracking an increase in the pace of attacks tied to Conti ransomware. Also featured are what "protection" means today and building a new cybersecurity operating model.
-
Facilitating the Secure Exchange of Health Data
22/09/2021The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.
-
Is White House Crackdown on Ransomware Having Any Effect?
17/09/2021The latest edition of the ISMG Security Report features an analysis of the state of the Biden administration's efforts to disrupt ransomware attackers, as well as how a newly patched Apple iMessage flaw was being targeted by Pegasus spyware to effect zero-click exploits.
-
Ransomware: Hot or Not? Here's Attackers' Ideal Target
10/09/2021The latest edition of the ISMG Security Report features an analysis of the most sought-after type of victim for ransomware-wielding attackers. Also featured: fighting extortion schemes and stress management tips.
-
Navigating the New Internet Attack Surface
08/09/2021It’s the largest attack surface in history, and adversaries are taking advantage by launching attacks at an unprecedented volume and velocity. Shashi Prakash of Bolster discusses how to monitor and manage this new and shifting range.
-
How Infusion Pump Security Flaws Can Mess with Drug Dosing
07/09/2021Several security vulnerabilities in infusion pump products from B. Braun could collectively allow malicious actors to modify the dose of medicines delivered to patients, says Douglas McKee, a security researcher on a McAfee Enterprise team that recently discovered the flaws.
-
Analysis: The Latest Data Breach Trends
03/09/2021The latest edition of the ISMG Security Report features an analysis of data breach trends. Also featured: yet another Microsoft Exchange vulnerability and misconceptions about cybercrime groups.
-
Wait, Watch, Disrupt: How Police Keep Targeting Cybercrime
31/08/2021Because a relatively small number of individuals provide the vast majority of services and infrastructure that power cybercrime, they remain top targets for arrest - or at least disruption - by law enforcement authorities, says cybercrime expert Alan Woodward. But of course, geopolitics sometimes gets in the way.
-
The Ransomware Files, Episode 1: The School District
27/08/2021This is the first episode of "The Ransomware Files," a podcast series focused on stories of resilience in the fight against ransomware. A systems administrator with a school district in Washington state recounts a brush with Ryuk ransomware and how the district recovered through tenacity and a bit of luck.
-
Analysis: New White House Security Initiatives
27/08/2021This edition of the ISMG Security Report features an analysis initiatives unveiled by the Biden administration to enhance supply chain and critical infrastructure security and address the cybersecurity skills gap. Also featured: LockBit 2.0 ransomware rep 'tells all'; misconfigured Microsoft Power Apps.
-
Analysis: Disrupting the Cybercrime-as-a-Service Model
20/08/2021The latest edition of the ISMG Security Report features an analysis of the cybercrime-as-a-service model and how law enforcement could potentially disrupt it. Also featured: T-Mobile probes a massive data breach; tackling abuse in the workplace.
-
Analysis: Self-Driving Tractors at Risk of Being Hacked
13/08/2021This edition of the ISMG Security Report offers an analysis of how tractors manufactured by John Deere are at risk of being hacked. Also featured: a description of the infrastructure bill passed by the Senate that would boost cybersecurity funding and an update on the reboot of the AlphaBay darknet market.
-
Ongoing Issues With Security, Privacy, Complexity
13/08/2021Rebecca Herold, host of the podcast show "Data Security and Privacy with the Privacy Professor," weighs in on the state of cybersecurity and privacy education and gives her recommendations on how to remedy the many issues the security community faces today.
-
Analysis: Oh, the Lies Ransomware Operators Tell
06/08/2021The latest edition of the ISMG Security Report features an analysis of how ransomware attackers share about their inclinations, motivations and tactics. Also featured: The rise of integrity attacks; dispelling vaccine myths.
-
Autonomous Real-Time Patching and Penetration Testing
03/08/2021David Brumley, CEO of ForAllSecure, is the creator of Mayhem, a machine that applies patching and continuous penetration testing autonomously and in real time. He discusses software flaw detection and more in this episode of "Cybersecurity Unplugged."
-
Analysis: Keeping Track of Ransomware Gangs
30/07/2021The latest edition of the ISMG Security Report features an analysis of the disappearance of ransomware-as-a-service groups, such as REvil and Darkside, and how that impacts the wider cybercrime ecosystem. Also featured: ransomware recovery tips; regulating cyber surveillance tools.
-
Cybersecurity's Impact on the Global Economy
30/07/2021Macroeconomist Katheryn "Kadee" Russ analyzes how the deployment of 5G networks and technologies will lead to a change in the growth of the digital economy and digital trade.
-
Waging a War on Cybercrime With Big Data and AI
28/07/2021Some 95% of today’s compromises are either zero-day exploits or malware-free attacks; that means that signature-based behavioral defenses only work for 5% of attacks, says Joe Head of Intrusion Inc. He discusses how to use massive lists of historical data to train AI to spot and stop malicious activity.
-
Alert for Ransomware Attack Victims: Here's How to Respond
23/07/2021As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.