Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Exclusive: OCR's McGraw on Timing of HIPAA Audits
04/09/2015In her first interview since joining the HHS Office for Civil Rights as deputy director of health information privacy, Deven McGraw describes plans to relaunch HIPAA compliance audits next year and outlines other priorities.
-
Account Takeovers: Did FFIEC Guidance Make a Difference?
03/09/2015Four years after the FFIEC issued its updated authentication guidance, many banking institutions say account takeover losses have gone up, a new survey shows. John LaCour of PhishLabs explains why institutions' reactive approach to fraud is failing.
-
FDA Official: More Medical Device Vulnerability Discoveries Are Likely
03/09/2015FDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use.
-
After Hacks, ONC Emphasizing ID and Access Management
02/09/2015In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.
-
How Hackers Are Bypassing Intrusion Detection
02/09/2015More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.
-
Incident Response: Lessons Government Can Learn from Industry
02/09/2015Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.
-
InfoSec Careers: How to Attract, Retain More Women
02/09/2015Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.
-
Proactive Malware Hunting
01/09/2015If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.
-
Fighting Healthcare Payments Fraud
01/09/2015When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.
-
How KeyRaider Malware Hacked 225K Apple Accounts
01/09/2015The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.
-
Will Medical Device Security Risks Grow?
31/08/2015Cybersecurity risks to medical devices will become an even more critical issue for healthcare organizations to address next year because of the need to maintain patient trust, says Rob Potter of Symantec.
-
Hacker Havens: The Rise of Bulletproof Hosting Environments
31/08/2015Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.
-
BA Agreements: Going Beyond the Basics
27/08/2015In preparing business associate agreements, healthcare organizations should demand a right-to-audit clause and copies of vendors' current security policies as proof that the companies are taking appropriate measures to protect patient data, says security expert Rebecca Herold.
-
Gartner's Litan Warns of EMV Fraud Risks
27/08/2015Although EMV is a far more secure payments technology, it can be exploited for fraud if it's improperly implemented, warns Gartner analyst Avivah Litan. What security lessons must be learned from past EMV deployments?
-
Killing Bugs: Focus on 'Half-Life'
26/08/2015CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
-
Protecting Research Data: What Works?
26/08/2015One of the most difficult challenges in protecting sensitive patient data that's used in medical research is educating researchers and other clinicians who share that data about potential privacy issues, says Dave Summitt of Moffitt Cancer Center in Florida.
-
Venture Capitalist: 'I'm Still Bullish'
24/08/2015By the time venture capitalist Alberto Yépez had breakfast on Monday, global markets had plunged, and the Dow had lost 1,000 points and gained back nearly 900. His message to cybersecurity investors about the volatile market: "I'm still bullish."
-
Impact of Economically Weaker China on Cyber Spying
24/08/2015Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.
-
A CISO's Strategy for Fighting Phishing Attacks
24/08/2015Hacker attacks often start with spear-phishing attempts, but healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami, who describes her organization's approach.
-
Mitigating Organizational Risks After the Ashley Madison Leaks
24/08/2015To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.