Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • DDoS Attacks Continue to Grow

    27/02/2014

    Neustar is about to release a new report on the DDoS threat landscape. What are some of the key trends to watch? Neustar's Jim Fink offers a preview of the study's findings.

  • How to Improve Cybercrime Tracking

    27/02/2014

    With enhanced analytics, organizations and law enforcement are improving their ability to trace malware attacks and other advanced persistent threats, says Eward Driehuis of Fox-IT.

  • Fighting Phone Fraud

    27/02/2014

    While much of the security focus is on online fraud and major data breaches, organizations of all sizes and sectors are seeing a rise in phone-based fraud, says Matt Anthony of Pindrop Security.

  • The API as an Attack Vector

    27/02/2014

    The application programming interface is now an attack vector, which creates new security issues, warns Travis Broughton, IT architect at Intel.

  • Improving Encryption Management

    27/02/2014

    As organizations expand their use of encryption to help prevent breaches, they must improve their management of cryptographic keys, says Prakash Panjwani, senior vice president at SafeNet.

  • How Mobile Hacks Threaten Enterprise

    26/02/2014

    Among the biggest cyberthreats enterprises face comes from hacks on consumer mobile devices, says Caleb Barlow, a director of product management at IBM Security.

  • Insights on Enhancing Authentication

    26/02/2014

    Too many businesses are worried about how security might adversely affect the user experience, even among their own workforce, says Bert Rankin, chief marketing officer of ThreatMetrix.

  • 2014 Brings Shift in Cyber-Attacks

    26/02/2014

    While massive DDoS attacks were dominant in 2013, this year, smaller application-layer attacks going after such things as log-in pages and password files are far more common, says Rich Bolstridge, chief strategist, financial services, at Akamai Technologies.

  • DDoS: More Defenses Needed

    26/02/2014

    While January's seemingly isolated distributed-denial-of-service attacks against JPMorgan Chase and Bank of America may have been a blip, DDoS expert Barrett Lyon says stronger attacks are on the way.

  • Security: Going Beyond Compliance

    26/02/2014

    While most organizations are focusing on compliance, they are ignoring basic human-factor security risks that technology cannot fix, says Hord Tipton, executive director of the International Systems Security Certification Consortium, better known as (ISC)².

  • iBoss Offers Behavioral Analysis

    26/02/2014

    The gateway security solutions provider iBoss Network Security is enhancing its offerings by incorporating analysis of behavioral movement of traffic in and out of the network.

  • Cyberthreat Protection Evolves

    25/02/2014

    The increasing use of cloud-based resources requires a new approach to protection against cyberthreats, says Ashley Stephenson, CEO at Corero Network Security.

  • FIDO: Beyond 'Simple' Authentication

    25/02/2014

    Simple credentials, such as passwords, are a hacker's best friend, says Phillip Dunkelberger of Nok Nok Labs, a founding member of the FIDO Alliance. That's why the alliance is working to reduce reliance on passwords by enabling advanced authentication.

  • Cisco Unveils Open Source Initiative

    25/02/2014

    Cisco has launched a new open source initiative focused on application identification, says Scott Harrell, vice president of the company's security business group.

  • The Impact of Bit9, Carbon Black Merger

    25/02/2014

    The recent merger of Bit9 and Carbon Black will eventually result in a single, merged product offering, says Benjamin Johnson, CTO at Carbon Black.

  • CipherCloud Unveils New Platform

    25/02/2014

    CipherCloud's Paige Leidig discusses a new offering that helps enable organizations rapidly adopt a cloud application as it protects sensitive data and ensures compliance to policies and regulations.

  • Securing Network Architecture

    25/02/2014

    Although the growth of cloud-based data centers offers opportunities to more rapidly deploy applications, it also raises new security issues, says Steve Pao, senior vice president at Barracuda Networks.

  • Cryptocurrency an Easy Target

    25/02/2014

    Researchers at Dell SecureWorks have identified some 146 unique malware families that are targeting cryptocurrencies. Approximately 100 of those have emerged in just the last year, says Pat Litke, security analysis adviser for the company's CyberThreat unit.

  • Log Analysis for Breach Prevention

    25/02/2014

    Log analysis is often used for managed security, but are organizations going far enough with the information they have at their fingertips? Don Gray, chief security strategist for Solutionary, says there is much more organizations could be doing to predict breaches.

  • Advanced Threat Defense

    24/02/2014

    Advanced, ever-evolving threats call for security solutions vendors to counter with equally advanced and sophisticated solutions. JD Sherry of Trend Micro discusses new strategic alliances and product sets dedicated to creating new measures of threat defense.

página 125 de 174