Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Why 'Adaptive Defense' Is Critical

    12/02/2015

    As hack attacks, such as the breach of Anthem Inc., become more common, it's more critical than ever for organizations to carry out an "adaptive defense model" to protect sensitive information, says Dave Merkel, chief technology officer at FireEye.

  • Can PINs Reduce Online Fraud?

    10/02/2015

    PINS can effectively reduce card-not-present as well as card-present fraud, argues Liz Garner of the Merchant Advisory Group, who will be a featured speaker at Information Security Media Group's upcoming Fraud Summit Los Angeles.

  • Why Fraud Is Shifting to Mobile Devices

    05/02/2015

    As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.

  • Monitoring Third-Party Breach Risks

    04/02/2015

    Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.

  • New Strategies to Fight Email Fraud

    04/02/2015

    Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.

  • Radware CEO on Identifying Intruders

    02/02/2015

    Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.

  • SafeNet CEO on Data Breach Security

    29/01/2015

    Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.

  • Taking Security Training to the Next Level

    29/01/2015

    Texas Chief Information Security Officer Brian Engle, like other CISOs, has voiced concerns that the state government didn't have sufficient staffers and managers with the right set of IT security skills. Engle, however, did something about it.

  • VASCO CEO on Authentication Trends

    26/01/2015

    The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.

  • The Changing Role of Healthcare CISOs

    20/01/2015

    CISOs are moving from being entrenched in technology issues to becoming more involved in top-level business matters, which requires new skills, says George McCulloch, who leads the new Association for Executives in Healthcare Information Security.

  • CIO Leader Outlines an InfoSec Strategy

    13/01/2015

    To help protect health data as cyberthreats evolve, healthcare CIOs must roll out a "blended strategy" for security, says Charles Christian, new chairman of the College of Healthcare Information Management Executives, an association of CIOs.

  • Expert: Sony Hackers Sound Russian

    12/01/2015

    The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo Engelson Argamon says the messages appear to have been written by native Russian speakers.

  • Fidelis CEO on Breach Response

    08/01/2015

    Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.

  • Addressing Health Data Sharing Risks

    06/01/2015

    As healthcare organizations step up their efforts this year to exchange more patient data with others to improve care, it's urgent that they address the "significant risks" involved, says Erik Devine, chief security officer at an Illinois hospital.

  • Fraud: Underground Markets Evolving

    05/01/2015

    Over the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works.

  • Arbor Networks' President on DDoS

    29/12/2014

    Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.

  • Web Based Attack Trends and How to Leverage Information Sharing

    26/12/2014

    Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.

  • Staffing Crisis: What India Can Do

    26/12/2014

    Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)².

  • Sony Hack Breaks 'Nation-State' Mold

    23/12/2014

    While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.

  • ZixCorp CEO on E-mail Security Evolution

    22/12/2014

    Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?

página 103 de 143