Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Healthcare DDoS Attack: Mitigation Lessons
10/09/2014Boston Children's Hospital CIO Daniel Nigrin, M.D., describes the impact of a recent DDoS attack on the medical center and lessons that other healthcare facilities can learn from that event.
-
Keys to Fighting Insider Fraud
09/09/2014What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
-
Breach Prevention: A New Approach
08/09/2014Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
-
InfoSec Career Advice from HIMSS' Lee Kim
05/09/2014Today's information security professionals need to "be like a sponge and learn from various domains that are outside your niche," says Lee Kim, director of privacy and security at the Healthcare Information and Management Systems Society.
-
Army Cyber Leader Touts Hacking Skills
04/09/2014If the U.S. military awarded a decoration for hacking, Army Col. Gregory Conti would wear it proudly on his uniform. Hear Conti, director of the Army Cyber Institute, explain why ethical hacking helps drive America's innovation engine.
-
Cyber Framework: Setting Record Straight
27/08/2014In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst.
-
Privacy for Non-Privacy Professionals
25/08/2014The IAPP has launched a new privacy certification designed for IT, security and engineering pros. What are the key elements of this new program? JC Cannon, a privacy author and educator, shares details.
-
Breach Response: Are We Doing Enough?
25/08/2014What lessons can be learned from recent high-profile breaches? IT security experts John Pescatore of the SANS Institute and Ron Ross of NIST explain how organizations can work to mitigate the new-style data breach threat. Listen to the conversation.
-
Mobile Banking: Evolved Services, Risks
22/08/20142014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
-
Michael Daniel's Path to the White House
21/08/2014Michael Daniel explains that among his biggest challenges as special assistant to the president is fully understanding the economics and psychology behind cybersecurity, topics that few people have mastered.
-
Cybersecurity: What Boards Must Know
20/08/2014As the Target breach demonstrated, boards of directors will be held accountable when their organizations are breached. Attorney Kim Peretti offers tips on how to educate boards about security issues.
-
Apple iOS 8: What's New for Security?
20/08/2014Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
-
Where IT and Security Meet
12/08/2014Christopher Augustin, new CIO at First Data, brings both a Wall Street and a start-up perspective to this role. How does he expect to incorporate security to enable the next generation of payments tech?
-
Blackphone: Inside a Secure Smart Phone
08/08/2014Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
-
A Holistic Approach to Security
08/08/2014No single security solution is enough to defend against today's multifaceted exploits. So it's time for a new holistic and cooperative approach to information security, says Bob Hansmann of Websense.
-
Cybersecurity: Why It's Got to Be a Team Sport
08/08/2014Former NSA information assurance leader Tony Sager goes on the road to the Black Hat USA security conference to promote the notion that no one should try to solve cybersecurity threats alone.
-
The Password Is 'Dead'
07/08/2014Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
-
Incident Response: 'Drowning in Alerts'
07/08/2014When it comes to incident response, organizations don't lack threat intelligence. They lack the automation, tools and the skilled staff to act on that intelligence, says Craig Carpenter of AccessData.
-
Putting CyberVor in Perspective
07/08/2014That Russian hackers may be hording 1.2 billion credentials merely reflects the insecurity of the world we live in today, says David Perry, threat strategist at the Finnish IT security company F-Secure.
-
Is Consulting the Right Gig for You?
05/08/2014Have you ever considered starting your own information security consulting firm? Kate Borten, who made the switch from CISO to consultant, offers insights on making a successful transition.