Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Changing Landscape of Application Security
02/04/2014Increasingly, organizations are seeing attacks migrate from the network to the application level. How can security leaders ensure they are prepared to handle this shift? Kunal Anand of Prevoty offers insight.
-
Inside the New Global Threat Report
01/04/2014Even so-called minor breaches can cost organizations nearly $200,000, according to one finding from NTT Group's annual Intelligence Report. Rob Kraus of Solutionary shares the study's insights and advice.
-
Advanced Threat Defense
31/03/2014Advanced threats are like the weather. Everyone talks about them, but few have a solid defense plan - or even a solid understanding of the threat landscape. Mike Nichols of General Dynamics Fidelis Cybersecurity Solutions offers insight.
-
Measuring Healthcare InfoSec Competency
28/03/2014Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
-
(ISC)² Turns 25: What's Ahead?
25/03/2014(ISC)² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth?
-
Why Is End-to-End Encryption So Daunting?
24/03/2014Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
-
State Marijuana Laws: The Challenges
20/03/2014New guidance from FinCEN addresses know-your-customer concerns surrounding financial transactions linked to legal marijuana businesses. Anti-money-laundering expert Kevin Sullivan sorts through the advice.
-
Malware: New Attacks Evade Detection
19/03/2014Banking Trojans such as Zeus have gotten much tougher to detect because of new attack techniques, which means intrusions are going undiscovered for longer periods, says Trusteer researcher Etay Maor.
-
So, You Want a Career in Privacy?
18/03/2014There have never been more career options for privacy professionals. But what are the essential skills and experience for advancement? Michelle Dennedy of Intel Security discusses her career path.
-
Third-Party Risks: Containment Strategy
14/03/2014Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka5 discusses how to mitigate third-party risks.
-
Retail Breaches: The Malware Source
12/03/2014Attackers likely purchased malware in underground "cybercrime-as-a-service" markets to use in recent credit card breaches, including the Target Corp. attack, a new report from McAfee Labs asserts. Adam Wosotowsky explains the report's findings.
-
FIDO: Pushing International Buy-In
12/03/2014One key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president.
-
Deploying a Continuous Monitoring Plan
11/03/2014A problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says.
-
Dedicated DDoS Protection
06/03/2014Distributed-denial-of-service attacks are a concern for all organizations. But financial institutions face unique challenges, and so they require a unique level of protection, says Mark Byers of Fortinet.
-
Continuous Diagnostics: A Game Changer
04/03/2014Phyllis Schneck, the Department of Homeland Security's deputy undersecretary for cybersecurity, equates the department's continuous diagnostics and mitigation initiative with a medical probe detecting an infection in the human body.
-
Automating Data Analysis
03/03/2014By automating data analysis, organizations can enhance their threat intelligence and lessen their workloads, says Flint Brenton, president and CEO of AccelOps.
-
Security Professionals: Time to Step Up
03/03/2014In the wake of high-profile breaches and data leaks, the government will pay a lot more attention to information security. Are security pros ready for this scrutiny? Professor Eugene Spafford has his doubts.
-
Real Threat Intelligence
27/02/2014Everyone is talking about threat intelligence, but what are the characteristics that make it useful? David Duncan of Webroot offers insights on new solutions and partnerships.
-
The Evolving Threatscape
27/02/2014Traditional fraud has evolved in complexity, changing the threat landscape dramatically. Greg Maudsley and Preston Hogue of F5 discuss new strategies to mitigate evolving threats.
-
Keys to Secure Content Sharing
27/02/2014As content sharing via mobile devices becomes more common, organizations must make sure security issues are adequately addressed, says Hormazd Romer, senior director of product marketing at Accellion.