Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Target Malware: Exploring the Origins

    20/01/2014

    Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks to a 17-year-old hacker in Russia, offers an exclusive, in-depth explanation of his company's findings.

  • Exclusive: Inside Cisco Security Report

    17/01/2014

    From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.

  • Network Security: Enhancing Visibility Through Integration

    17/01/2014

    From access controls to intrusion detection, mobility to privacy, many organizations face similar network security challenges. Isabelle Dumont of Palo Alto networks offers a new, unique approach for healthcare organizations, and the key concepts of this approach can be applied to any security environment.

  • Breach Predictions for 2014

    17/01/2014

    2014 is going to be a critical year for data breach preparation and response, according to Michael Bruemmer of Experian. What are the key breach-related developments that security leaders must watch?

  • 5 Trends to Sway Cybersecurity's Future

    11/01/2014

    Five significant trends, including the mobile revolution and the use of big data, will influence the future of cybersecurity, says Allan Friedman, co-author of a new book on the subject.

  • Why Training Doesn't Mitigate Phishing

    07/01/2014

    Training that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject.

  • Background Screening: Top 10 Trends

    06/01/2014

    The new year's top trends in background screening can be summed up in two words: legal and compliance. Les Rosen of Employment Screening Resources offers expert tips for more effective screening.

  • FIDO's 2014 Authentication Agenda

    03/01/2014

    To help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014.

  • 2014 Cybersecurity Forecast

    03/01/2014

    As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.

  • Mobile Security Case Study

    02/01/2014

    As bank employees rely more on mobile devices to get their work done, ensuring secure file-sharing is a top priority. James Gordon of Needham Bank in Massachusetts shares his security strategy.

  • 5 Resolutions for IT Security Pros

    30/12/2013

    2014 may well be the "Year of Security," and IT security pros must prepare now for new job demands. ISACA's Robert Stroud offers five New Year's resolutions to help prepare for 2014's security trends.

  • Improving the Way to Manage Risk

    26/12/2013

    While preparing a speech to be delivered in Korea, NIST's Ron Ross wanted to convey the message of the importance of computer security. He hit on five themes - threat, assets, complexity, integration and trustworthiness - which form the acronym TACIT.

  • Target Breach: A Watershed Event

    23/12/2013

    The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.

  • ENISA on the New Threat Landscape

    19/12/2013

    Cyberthreats increasingly target mobile devices, and simple security measures could help end-users slash these incidents by 50 percent. This is the key finding of ENISA's new Threat Landscape Report, says Louis Marinos, the prime author.

  • Fighting Fraud With ID Management

    16/12/2013

    Most fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model.

  • Creating Role-Based Security Training

    10/12/2013

    Managers at all levels must understand their responsibilities in providing role-based cybersecurity training, says Patricia Toth, a computer scientist at the National Institute of Standards and Technology.

  • Major Password Breach: Lessons Learned

    06/12/2013

    The theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says.

  • Questioning the Culture of Surveillance

    02/12/2013

    You can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."

  • Cloud Security: Top 10 Tips

    27/11/2013

    Governments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report.

  • How to Minimize Supply Chain Risks

    19/11/2013

    For risk managers, an often overlooked step for minimizing supply chain risks is to continually monitor outsourcers and other third parties to address critical security issues, says the Information Security Forum's Steve Durbin.

página 114 de 143