Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Analysis: Implications of Water Treatment Plant Hack
12/02/2021The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant. Also featured: The CISO of the World Health Organization discusses supply chain security; hackers steal celebrities' cryptocurrency.
-
Data Sharing: The Need for Transparency
08/02/2021Mobile app and other technology vendors must clearly communicate to users how their sensitive health data will be shared with third parties - especially those in China and other nations. Otherwise, they face potential regulatory scrutiny as well as privacy lawsuits, says regulatory attorney Ashley Thomas.
-
Account Takeover in 2021 - and How to Prevent It
05/02/2021SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.
-
Analysis: The Persistent Ransomware Threat
05/02/2021The latest edition of the ISMG Security Report features an analysis of the persistent threat of ransomware. Also featured: Sorting out breaches tied to Accellion’s File Transfer Appliance; an update on fraud trends in 2021.
-
Analysis: Emotet and Netwalker Takedowns
29/01/2021The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology.
-
Tips on Securing Endpoints, Ensuring Compliance
27/01/2021Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject.
-
Analysis: How Will Biden Address Cybersecurity Challenges?
22/01/2021The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic.
-
Is a US National Privacy Law on the Horizon?
18/01/2021The prospects for passing a U.S. privacy law will improve under the Biden administration, predicts attorney Kirk Nahra, who offers a legislative outlook.
-
SolarWinds Supply Chain Hack: Investigation Update
15/01/2021The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.
-
Securing the New 'Branch Office'
11/01/2021The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.
-
Analysis: The Latest SolarWinds Hack Developments
08/01/2021This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.
-
Why Facebook's Diem is 'a Shadow of Libra'
31/12/2020Facebook's relaunch and rebrand of its Libra digital payment initiative as Diem is seen by some as a shadow of its former self. Financial services commentator Chris Skinner explains why state governments and AML concerns are to blame.
-
Providing Patients With Records Access: Overcoming Challenges
31/12/2020As federal regulators intensify their focus on compliance with requirements to provide patients with access to their health information, healthcare organizations need to sort through a variety of emerging challenges, says health information management and privacy expert Rita Bowen.
-
Cybersecurity Leaders Talk Tactics, Techniques, Challenges
31/12/2020The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.
-
Shaping the Future of Payments and Identity
30/12/2020Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.
-
COVID-19: Evolving Regulatory Issues
28/12/2020The COVID-19 pandemic has spotlighted an array of evolving patient privacy issues that legislators and regulators will need to address in the year ahead, say government policy experts Mari Savickis and Cassie Leonard of the College of Healthcare Information Management Executives.
-
Analysis: Supply Chain Management After SolarWinds Hack
25/12/2020This edition of the ISMG Security Report features insights from David Forscey, managing director at Aspen Cybersecurity Group, on improving supply chain security in the aftermath of the SolarWinds hack. Also featured: Black Hat Europe's key takeaways; keeping safe during the holidays.
-
5 Key Steps to Building a Resilient Digital Infrastructure
21/12/2020In light of the SolarWinds supply chain breach and other security incidents, the United States has substantial work to do in building a resilient digital infrastructure, says David Forscey of the Aspen Cyber Group, who outlines a five-step road map.
-
Analysis: The Impact of SolarWinds Hack
18/12/2020The latest edition of the ISMG Security Report features an analysis of what we know so far about the impact of the SolarWinds supply chain hack and how to respond.
-
Critical Factors to Consider Before Paying a Ransom
11/12/2020What critical factors should organizations consider before taking the step of paying extortionists a ransom in hopes of regaining access to systems or avoiding the release of data in the wake of a ransomware attack? Former FBI special agent Vincent D'Agostino provides guidance.