Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • BYOD: Secure the Network

    11/02/2013

    We've seen user-driven trends such as BYOD before, says Kevin Flynn of Fortinet. And if organizations remember past security lessons, they will avoid falling prey to mistakes that could lead to breaches.

  • Health Data Breach Response Tips

    11/02/2013

    Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.

  • Cybersecurity: It's a Skills Crisis

    07/02/2013

    It isn't just a staffing shortage that stops organizations from building cyberteams. It's a skills crisis, says SANS Institute founder Alan Paller, who tells why now is the ideal time to fill top roles with qualified professionals.

  • 2013 Data Protection Agenda

    05/02/2013

    How can security pros help organizations prevent breaches and data loss? The Online Trust Alliance has released its latest guide to data protection and breach readiness, and OTA founder Craig Spiezle offers tips.

  • Securing Data Via Containerization

    01/02/2013

    Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.

  • Continuous Monitoring and the Cloud

    25/01/2013

    As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.

  • Top Malware Threats of 2013

    24/01/2013

    In 2012, we saw the rise of state-sponsored malware, as well as the evolution of Trojans and ransomware. What new threats will 2013 bring? Adam Kujawa of Malwarebytes offers insights.

  • CISOs Reveal Top Threat Worries

    22/01/2013

    It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.

  • ENISA Identifies Top Cyberthreats

    21/01/2013

    ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?

  • Maturing of Biometrics on Smart Phones

    16/01/2013

    Smart phones that give many IT security managers headaches in developing security policies are being used in increasing numbers to help safeguard systems and applications, thanks to more muscular biometric features, says Steve Vinsik of Unisys.

  • The Evolution of Incident Response

    14/01/2013

    It isn't so much the changing threat landscape that causes security leaders to re-assess their approach to incident response. Mobility and the expanding perimeter are the real factors driving change.

  • VanRoekel on Infosec and Sequestration

    14/01/2013

    With Congress facing $1.2 trillion in budget cuts, Federal Chief Information Officer Steven VanRoekel says funding for cybersecurity initiatives will likely be affected. But with smart planning, government information technology should not be placed at risk.

  • Top 10 Screening Trends for 2013

    11/01/2013

    How will new guidance on criminal background checks change the way organizations approach employment screening? This is one of the key trends to watch in 2013, says screening expert Les Rosen.

  • ID Theft: 2013 Top Trends

    10/01/2013

    ID theft is a growing global problem. Eva Velasquez, head of the ITRC, outlines how public and private organizations in 2013 can update approaches to ID theft prevention.

  • Educational Value of Competition

    09/01/2013

    Does cyber defense competition help prepare college students for real-world jobs in information security and risk management? Dan Likarish and Rick Cisneros of Regis University say yes. Here's why.

  • Tackling the Authentication Challenge

    08/01/2013

    The evolution of threats and rise of mobility are leading organizations to improve user authentication. What are the new strategies and solutions security leaders in all sectors will employ this year?

  • Hanging Tough with Int'l Privacy Regs

    04/01/2013

    With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.

  • Legislation to Watch in 2013

    03/01/2013

    Cloud computing and mobility are areas likely to see new regulatory attention in the year ahead. But what are the other hot topics that leading attorneys believe will be addressed in new legislation worldwide?

  • Account Takeover: The 2013 Outlook

    03/01/2013

    What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters.

  • How to Say 'Yes' to BYOD

    01/01/2013

    When it comes to mobility, how do leaders balance security needs with employees' BYOD desires? The easy answer: Just say no. But that's also the wrong answer. What security tips do these leaders offer?

página 123 de 143