Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
New Privacy Issues for Amazon
10/08/2018An analysis of the privacy issues Amazon will face as it dives deeper into the healthcare business leads the latest edition of the ISMG Security Report. Also featured: A preview of ISMG's Security Summit in New York Aug. 14-15.
-
The Global State of Online Digital Trust
09/08/2018Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is but one of the findings of the new 2018 Global State of Online Digital Trust study commissioned by CA Technologies. CA's David Duncan analyzes the results.
-
Training to Improve Support of Product Security
08/08/2018The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources.
-
Amazon's Healthcare Expansion: Analyzing Privacy Concerns
06/08/2018As Amazon expands its activities in healthcare, include a high-profile venture into the pharmacy business, the online retail giant will face a wide variety of important privacy issues, attorneys Jeffrey Short and Todd Nova explain.
-
Election Security Insights From Former Federal CISO
06/08/2018Retired Brigadier General Gregory Touhill, the first CISO of the federal government, spells out what he sees as the essential steps for fighting against Russian meddling in this year's midterm elections. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.
-
How to Secure US Elections - Before It's Too Late
03/08/2018Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns.
-
Fighting Election Meddling: A Three-Pronged Approach
01/08/2018What should President Donald Trump do to prevent Russian meddling in the midterm elections? Ed Amoroso, the former CISO of AT&T, offers three bold suggestions. He'll be a featured speaker at ISMG's Security Summit in New York, to be held Aug. 14-15.
-
Trailblazing CISO Stephen Katz Offers Cybersecurity Insights
31/07/2018What advice does the world's first CISO have for the current generation of CISOs? Stephen Katz emphasizes, first and foremost, that cybersecurity must be treated as a business risk management issue rather than a technology issue. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.
-
A New SOC Strategy in Light of Skills Shortage
30/07/2018A move to a "more autonomous" security operations center is helping Encompass Health cope with a shortage of skilled cybersecurity workers while improving its response to cyber threats, says Mitch Thomas, chief security officer.
-
A More Dynamic Approach to Cybersecurity
30/07/2018Data science is playing a fundamental role in a more dynamic approach to cybersecurity, says Jim Routh, CISO of Aetna, who stresses the importance of applying machine learning to front-line data security controls. Routh will be a featured speaker at the ISMG Security Summit in New York Aug. 14-15.
-
An FBI Update on Fighting Against Russian Election Meddling
27/07/2018This edition of the ISMG Security Report features Elvis Chan, a supervisory special agent at the FBI, discussing ongoing efforts to thwart Russian interference in the U.S. midterm election this fall, and Alberto Yepez of ForgePoint Capital addressing cryptocurrency security issues.
-
Blockchain for Identity Management: Early Examples
25/07/2018Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
-
Threat Hunting: How to Evolve Your Incident Response
25/07/2018Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,
-
Ransomware: Why Rapid Detection Is So Critical
24/07/2018Recent ransomware attacks against healthcare organizations and others demonstrate why rapid detection is critical to limiting the malware's damage, says cybersecurity expert Bill Dixon of Kroll.
-
Preparing for 3-D Secure: The Next Generation
23/07/2018Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.
-
SamSam: Inside One of the World's Top Forms of Ransomware
23/07/2018Since 2015, Sophos has investigated the SamSam ransomware campaign, and it has just released its findings in a new report. What can you learn from SamSam attackers' unique tools, techniques and protocols? Chester Wisniewski of Sophos shares insight.
-
Trump's Views on Russian Election Meddling: A History
20/07/2018This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
-
A New Effort to Draft Medical Device Cybersecurity Guidance
19/07/2018An advisory group that includes a diverse array of members will spend the coming months devising detailed guidance on how to address the "shared responsibility" of medical device cybersecurity, explains Greg Garcia, who is leading the initiative.
-
Using Blockchain to Support a New Approach to ID Management
18/07/2018Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity."
-
Server Security: The Need for Deep Learning and Anti-Exploit
17/07/2018Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.