Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
How Banks Can Leverage the Bitcoin Infrastructure
21/09/2015The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.
-
A CIO Outlines Top Cybersecurity Priorities
18/09/2015In light of the uptick in hacker attacks on the healthcare sector, Everett Clinic in Washington is making a number of additional moves to bolster its cybersecurity, says CIO Becky Hood. Find out about the top priorities.
-
California's Proactive Approach to Cyberthreats
18/09/2015The creation of the California Cybersecurity Integration Center demonstrates that the state is taking a proactive approach to securing its digital assets, says Mark Weatherford, a former California state CISO and onetime DHS deputy undersecretary for cybersecurity.
-
Insider Threat: The Risk of Inaction
18/09/2015The insider threat is one that organizations often want to overlook. But it's hard to ignore when they are losing critical assets. Lockheed Martin's Douglas Thomas tells how to sell an insider threat program.
-
Will Mobile Payments Overshadow EMV Card Migration?
18/09/2015The U.S. migration to EMV chip payment cards, which is progressing slowly, will be overshadowed by EMV-compliant mobile payments, says Gray Taylor of Conexxus, a convenience store and petroleum industry technology association.
-
Safeguarding PHI: Overlooked Steps
17/09/2015While covered entities and business associates are becoming more aware of the need to encrypt patient data at rest, they often overlook securing data as it's shared and received, says security expert Joe Meyer of Coalfire.
-
U.S. Cyber Challenge Seeks to Boost Number of Security Pros
16/09/2015The 6-year-old U.S. Cyber Challenge, designed to build interest in cybersecurity careers, is going strong, as participation in its online competition and cyber boot camps continues to grow, says Karen Evans, the organization's national director.
-
Obama Threatens Sanctions Against China If Hacks Continue
16/09/2015President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.
-
Business Associates: The Next HIPAA Enforcement Target
16/09/2015As federal HIPAA enforcers increasingly scrutinize business associate compliance, BAs need to be paying close attention to the details of settlements that federal regulators are signing with covered entities for HIPAA non-compliance cases and data breaches, says privacy attorney Adam Greene.
-
How to Align Security to Business Performance
16/09/2015Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
-
Why Cybercrime Now Exceeds Conventional Crime
15/09/2015Drawn by the potential for low risk and high reward, criminals worldwide are increasingly pursuing online crime instead of conventional forms of property crime, such as burglary and robbery, warns cybersecurity expert Alan Woodward.
-
Overcoming ID and Access Management Struggles
15/09/2015Pediatric hospitals face an assortment of ID and access management challenges when managing Web portals that provide access to patient data, says Cris Ewell, CISO at Seattle Children's Hospital.
-
How the FBI Helped Recover Millions from Wire Fraud
15/09/2015FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.
-
Infusion Pump Security: NIST Refining Guidance
11/09/2015The National Institute of Standards and Technology is revamping its guidance on the cybersecurity of wireless infusion pumps. Gavin O'Brien of NIST's National Cybersecurity Center of Excellence describes the effort to tackle an issue that's attracting attention in the wake of a recent FDA alert.
-
Fighting Fraud: New Insights from a Former FBI Agent
09/09/2015As criminals get more savvy about circumventing financial institutions' fraud prevention controls, fraud-fighting collaboration among institutions and law enforcement officials is becoming more important, says Clyde Langley, a former FBI agent who'll be a presenter at ISMG's Sept. 15 Fraud Summit San Francisco.
-
MIT Offers Online Cybersecurity Training
09/09/2015The Massachusetts Institute of Technology is launching a new online cybersecurity course that aims to fill a gap for IT professionals as well as business leaders, says MIT's Clara Piloto.
-
Securing Buy-in to Fight APT
09/09/2015Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.
-
Commercializing Federal IT Security Wares
08/09/2015The federal government is licensing a government-built anomaly detection tool known as PathScan to Ernst & Young, which, in turn, will refine the software and market it. In an interview, DHS's Mike Pozmantier explains why the government is offering its technology to the private sector.
-
Preparing for Upcoming HIPAA Compliance Audits
08/09/2015To prepare for next year's resumption of HIPAA compliance audits, organizations must be ready to demonstrate how they're complying with the revised breach notification rule and how they're providing patients with electronic access to records, says attorney David Holtzman.
-
APT Attacks Will Seek Smaller Targets
07/09/2015With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.