Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Fighting Credential Stuffing Attacks
10/12/2018Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says Aseem Ahmed of Akamai Technologies, who shares best practices for mitigating the threats.
-
GOP Hacking Incident: What Happened?
07/12/2018An update on the hacking of email accounts of four senior aides within the National Republican Congressional Committee leads the latest edition of the ISMG Security Report. Also featured: An analysis of when the first major fines for violations of the EU's GDPR could be issued.
-
Applying Secure Multiparty Computation Technology
06/12/2018Israel-based Yehuda Lindell, a cryptography professor, describes how to use secure multiparty computation technology to protect cryptographic keys and describes other potential security applications.
-
Federal Prosecutors Discuss SamSam Indictments
30/11/2018In the latest edition of the ISMG Security Report, hear prosecutors discuss the indictments of two Iranians in connection with SamSam ransomware attacks. Also: Updates on allegations that Google is violating GDPR and cryptocurrency's impact on crime trends.
-
Malware Analysis for Blue Teams
28/11/2018At a time when security professionals are faced not only with a barrage of threats, but with a myriad of threat intelligence data sources, it can be challenging to know when to stop an investigation. Join DomainTools Senior Security Engineer Tarik Saleh to learn essential methodologies from a blue team perspective.
-
The State of Cloud (In)Security
27/11/2018FireEye is in a unique position to see global cybersecurity threats, threat actors and their impact on breached organizations. Grady Summers, FireEye's CTO, discusses how organizations can use staff and intelligence to bolster their cloud security defenses in 2019.
-
Managing the Risks Posed by Automotive Smartphone Apps
27/11/2018Automotive smartphone apps that can be used to unlock or start a car pose new risks that must be managed, says Asaf Ashkenazi of Inside Secure, a mobile security firm, who provides risk mitigation insights.
-
Hacking Your Ride: Risks Posed by Automotive Smartphone Apps
23/11/2018In the latest edition of the ISMG Security Report, Asaf Ashkenazi of the mobile security firm Inside Secure discusses new threats to car security posed by certain smartphone apps. Plus, updates on behavioral authentication and protecting "very attackable people" from hackers.
-
HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
19/11/2018So what's the mission of the newly launched Department of Health and Human Services' Health Sector Cybersecurity Coordination Center, and how will it function? HHS Deputy Secretary Eric Hargan explains the initiative and addresses top healthcare sector cybersecurity challenges in this in-depth interview.
-
China's Hack Attacks: An Economic Espionage Campaign
16/11/2018An analysis of China's surging hack attacks as part of an economic espionage campaign leads the latest edition of the ISMG Security Report. Also: Choosing the right MSSP, plus an analysis of the recent hijacking of Google traffic.
-
Using Unsupervised Machine Learning: The Challenges
14/11/2018While unsupervised machine learning techniques get away from the data labeling and classification that most supervised systems require, they are dependent on the quality and variety of the data provided, says Gartner's Jonathan Care.
-
Analysis: FDA's Reworked Premarket Medical Device Guidance
13/11/2018The FDA's recently issued draft document updating its premarket medical device cybersecurity guidance originally issued in 2014 contains several important provisions, says regulatory attorney Yarmela Pavlovic, who explains the details.
-
Tips for Getting the Most From an MSSP
12/11/2018How can organizations get the most out of partnering with managed security services providers and avoid common pitfalls? Cybersecurity consultant Vito Sardanopoli, an experienced CISO, offers top tips.
-
Cracking Down on Criminals' Use of Encrypted Communications
09/11/2018An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management.
-
State of the Authentication Landscape
06/11/2018As we approach 2019, is it realistic to think the end of our dependency on traditional user names and passwords is in sight? Shane Weeden, and authentication expert with IBM Security, discusses the future of authentication and why he's encouraged by the FIDO2 initiative.
-
Managing Third-Party Risk in the Age of Ransomware
06/11/2018As ransomware and other cyberattacks continues to proliferate, organizations must improve vendor risk management so they have a plan in place in case a business associate falls victim, says Mitch Parker, CISO of Indiana University Health System, who will speak at ISMG's Healthcare Security Summit in New York.
-
How IAM is Evolving in the Blockchain Era
05/11/2018Identity and access management is not about compliance anymore - It's really about security, says Gartner's Felix Gaehtgens. With cloud, virtualization, DevOps and other IT trends, IAM has evolved from being a one-off project to an ongoing initiative.
-
Bots and Botnets: Addressing the Evolving Security Challenges
02/11/2018Malicious bots and botnets are becoming increasingly common and sophisticated, and enterprises need to address them in their risk assessments and security frameworks, says Akamai's Aseem Ahmed.
-
The Escalating Problem of Protecting Connected Devices
02/11/2018The latest edition of the ISMG Security Report features Kevin McDonald of the Mayo Clinic discussing how to secure connected medical devices. Plus, updates on the indictments of Chinese agents for hacking and the unveiling of the Financial Services Sector Cybersecurity Profile.
-
Managing Cyber Risks: A New Tool for Banks
01/11/2018Banks have a new tool available for developing cyber risk management programs. In an interview, architects of the Financial Services Sector Cybersecurity Profile, Denyette DePierro and Josh Magri, describe how to use it. They'll offer more details at ISMG's Legal & Compliance Summit in New York on Nov. 15.