Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • The Dark Web's Automobile Hacking Forums

    14/11/2019

    There are robust and detailed discussions in cybercriminal forums on how to attack modern vehicles, seeking clandestine methods to steal cars, says Etay Maor of IntSights. Luckily, hackers aren't aiming to remotely trigger an accident, but there are broader concerns as vehicles become increasingly computerized.

  • Google's Push Into Health Sector: Emerging Privacy Issues

    13/11/2019

    With Google aggressively expanding its push into the healthcare sector, critical privacy-related issues are emerging, says regulatory attorney Alisa Chestler, who offers an overview of key issues.

  • What Mega Breaches Can Teach about Best Practices

    12/11/2019

    Getting breached is not a question of "if," but "when." Nick Carstensen of Graylog explains what steps should be taken to mitigate data breach risk.

  • Verizon: Companies Failing to Maintain PCI DSS Compliance

    12/11/2019

    Many companies around the world that accept card payments are failing to continually maintain compliance with the PCI Data Security Standard, according to the new Verizon 2019 Payment Security Report. Verizon's Rodolphe Simonetti, who contributed to the report, explains the findings.

  • CCPA Compliance: Identity Verification Challenges

    12/11/2019

    One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.

  • Identity Fraud: Account Origination

    11/11/2019

    Bala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses?

  • Protecting Data in Sprawling Computing Environments

    08/11/2019

    Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA.

  • Analysis: Using Twitter for Espionage

    08/11/2019

    The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks.

  • Why Is Third-Party Risk Management So Complex?

    07/11/2019

    Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner.

  • Getting Ready for the NIST Privacy Framework

    06/11/2019

    By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.

  • Inside the Sophos 2020 Threat Report

    05/11/2019

    The Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity landscape.

  • Why the Healthcare Sector Is So Vulnerable to Cybercrime

    01/11/2019

    The healthcare sector is especially susceptible to ever-evolving cybercrimes, says attorney Jason G. Weiss, a former FBI special agent and forensics expert, who describes critical steps to take to avoid falling victim.

  • Analysis: Preventing Data Exposure in the Cloud

    01/11/2019

    The latest edition of the ISMG Security Report offers an in-depth analysis of how to prevent data exposure in the cloud. Plus: why PCI's new contactless payment standard lacks PINs, and how to go beyond the hype to accurately define "zero trust."

  • Mobile Devices: Protecting Critical Data

    31/10/2019

    Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance.

  • How to Think Like an Attacker

    29/10/2019

    It's one thing to know your attackers. It's another to emulate some of their techniques so you can improve your own enterprise defenses. Craig Harber, CTO of Fidelis Cybersecurity, is an advocate of this "think like an attacker" defensive strategy.

  • How to Manage Supply Chain Risks

    28/10/2019

    Agile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks.

  • Cloud Security: 'Big Data' Leak Prevention Essentials

    28/10/2019

    Big data analytics and search tools give organizations the ability to analyze information faster than ever before. But too many organizations deactivate security controls built into Elasticsearch, Amazon S3 buckets and MongoDB when they deploy, leaving their data exposed, says Elastic's James Spiteri.

  • Using Standards to Bolster Medical Device Cybersecurity

    25/10/2019

    The use of new standards can help strengthen cybersecurity risk management of medical devices at the Department of Veterans Affairs as well as other healthcare organizations, says Anura Fernando of UL, which recently completed a study with the VA examining gaps in medical device cybersecurity approaches.

  • Analysis: Russian Hackers Hijack Iranian Hacking Tools

    25/10/2019

    The latest edition of the ISMG Security Report analyzes how the Russian hacking group Turla has been coopting Iranian hacking tools. Plus: Avast's CCleaner hit by second attack; sizing up draft regulations for the California Consumer Protection Act.

  • Helping Consumers Respond to Data Breaches

    23/10/2019

    Al Pascual, former head of fraud and security practices at Javelin Strategy & Research, has taken on a new role as COO of a start-up company, Breach Clarity, which is offering consumers a free tool to determine the severity and implications of a data breach and what steps they should take to mitigate risk.

página 36 de 143