Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
'Five Eyes' Intelligence Agencies Discuss Strategies
03/05/2019The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk.
-
Assessing the Cyber Threat Landscape
02/05/2019The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup. Trend's Greg Young shares insight from this report.
-
What's in HHS' New Plan for Nationwide Health Data Exchange?
01/05/2019What are the key privacy and security requirements proposed in the latest draft of the Trusted Exchange Framework and Common Agreement issued by federal regulators to promote nationwide secure health data exchange? Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains.
-
Managing Third-Party Risks in a New Era
01/05/2019How far does an organization's risk surface extend, and who are the custodians of all that data? A new research report aims to answer those questions. In a joint interview, Kelly White, of RiskRecon and Wade Baker of the Cyentia Institute offer an analysis.
-
Malware: The Evolution of Exploits and Defenses
30/04/2019The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes Labs talks about the evolution of ransomware and other successful exploits.
-
Identity Management: Finding Common Ground
29/04/2019Access risk: Security leaders understand their governance and technology challenges. But addressing them with new automated tools - and selling these new processes within their organizations? Those are the problems attendees attempted to solve at a recent dinner in Philadelphia.
-
Vendor Risk Management: A Better Approach
26/04/2019The risks posed by third-party vendors are a top concern for Aaron Miri, CIO of University of Texas at Austin's Dell Medical School and its affiliated UT Health Austin group practice. He explains steps he's taking to help mitigate those risks.
-
Privacy Peril: Facebook's Marketplace Flaw
26/04/2019The latest edition of the ISMG Security Report describes how a Facebook Marketplace glitch created serious privacy issues. Plus: An update on the activities of the FBI's Recovery Asset Team and HSBC whistleblower Everett Stern's preview of keynote address at upcoming ISMG Fraud and Breach Summit in Chicago.
-
HSBC Whistleblower: Fraud Fight Still Has Long Way to Go
24/04/2019Everett Stern, the whistleblower who called attention to HSBC's international money laundering activities, which ultimately resulted in a $1.9 billion fine, says the crackdown on financial fraud still has a long way to go. He'll be the keynoter at ISMG's Fraud and Breach Summit in Chicago on May 14.
-
A CISO Lists Top Governance Challenges
22/04/2019What are some of the toughest information security governance challenges healthcare organizations face? CISO Afzal Bashir discusses key insights based on his experience.
-
The Dangers of Unsecured Medical Devices
19/04/2019Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that medical device network connections are properly managed, monitored and secured is "much like keeping a weapon in a safe with the safety on."
-
Not So 'Smart' - Child Tech Has Hackable Flaws
19/04/2019A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.
-
Defending Against Authorized Push Payment Fraud
16/04/2019The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.
-
'Alexa, Are You HIPAA Compliant?'
16/04/2019Boston Children's Hospital is pioneering the use of Amazon's Alexa voice assist technology in the healthcare sector. John Brownstein, the hospital's chief innovation officer, discusses the security measures involved.
-
Raising the Bar on Browser Security
16/04/2019When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.
-
Privacy and Security: Finding the Balance
15/04/2019In the past, the relationship between cybersecurity and privacy has been uneasy and even ill-defined. But today, in the post-GDPR era, the relationship is clear, and so is the legal and compliance path forward, says David Ruiz of Malwarebytes.
-
Another Scathing Equifax Post-Breach Report
12/04/2019The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.
-
Women in Cybersecurity: A Progress Report
10/04/2019Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.
-
Planning for Financial Impact of Data Breaches
08/04/2019Healthcare organizations need to plan ahead for the financial burden of data breaches stemming from cyberattacks and also take preventive steps to help minimize those expenses, says attorney Laura Hammargren of the law firm Mayer Brown.
-
Analysis: The Evolving Ransomware Threat
05/04/2019The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.