Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
'Time for US Cyber Command to Take the Gloves Off'
13/07/2018In the wake of news that 12 additional Russians have been indicted for conspiring to interfere with the 2016 presidential election, a key question emerges: What will President Trump say when he meets Monday with Russian President Vladimir Putin? Carbon Black's Tom Kellermann offers analysis.
-
Analysis: California's Groundbreaking Privacy Law
13/07/2018The latest edition of the ISMG Security Report features a discussion of California's groundbreaking new privacy law as well as an update on the potential impact of the hacker group responsible for the Ticketmaster breach.
-
Bringing Vendor Risk Management to the Midmarket
09/07/2018A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his perspective on converting standards to practices.
-
Why California's New Privacy Law Is a 'Whole New Ballgame'
09/07/2018While California already had some of the strictest and most varied privacy laws in the country, the new California Consumer Privacy Act of 2018 "is a whole new ballgame," says privacy attorney Kirk Nahra, who explains why.
-
Cryptocurrency's Skyrocketing Money Laundering Problem
06/07/2018Leading the latest edition of the ISMG Security Report: CipherTrace CEO Dave Jevans discusses recent research on cryptocurrency money laundering and whether regulation is possible. Plus, California passes a new privacy law.
-
Cryptocurrency Laundering's Explosive Growth
03/07/2018Cryptocurrency money laundering is increasing dramatically, being already three times greater than in 2017. And we're only half way through the year, observes Dave Jevans, Founder and CEO of CipherTrace, and chairman of the Anti-Phishing Working Group.
-
Should Healthcare Companies Ever be Data Brokers?
29/06/2018Leading the latest edition of the ISMG Security Report: ISMG's Managing Editor, Security and Technology, Jeremy Kirk, details Australia's HealthEngine caught in a data-sharing fiasco.
-
Case Study: Protecting Electronic Medical Records
27/06/2018Virtualization and microsegmentation are helping to better protect electronic medical records and other critical systems at Nebraska Medicine, says the health system's CIO, Brian Lancaster.
-
A CIO on Carrying the Burden of Medical Device Cybersecurity
26/06/2018A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.
-
Behavioral Analytics and the Insider Threat
26/06/2018Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.
-
Identity Protection: Overcoming Hurdles
26/06/2018Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.
-
Threat Hunting: How to Evolve Your Incident Response
25/06/2018Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,
-
Preview: ISMG's Fraud and Breach Prevention Summit in Chicago
22/06/2018Leading the latest edition of the ISMG Security Report: A preview of next week's Fraud and Breach Summit in Chicago, which will feature keynoter Brett Johnson, a former cybercriminal who now advises organizations on fighting crime.
-
Providing Strongly Authenticated Device Identity
21/06/2018Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.
-
Is Regulating Cryptocurrency Necessary and Feasible?
20/06/2018Government regulation is key to minimizing the misuse of cryptocurrencies for cybercrime, says Brett Johnson, a former cybercriminal who now consults on crime prevention. But regulating cryptocurrencies is no easy task, he acknowledges. Johnson will keynote ISMG's Fraud and Breach Prevention Summit in Chicago.
-
Cybersecurity Insurance: How Underwriting Is Changing
18/06/2018Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward more carefully scrutinizing the cybersecurity postures of their potential clients.
-
Analysis: Distraction Tactics Used in Banco de Chile Hack
15/06/2018Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
-
Chip and No Signature: What's Behind the Move?
11/06/2018Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.
-
Analysis: Swiping Cryptocurrencies Through a Back Door
08/06/2018Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.
-
NIST Framework as a Foundation
07/06/2018Since its inception the NIST Cybersecurity Framework has been embraced across geographies and sectors. Trend Micro's Ed Cabrera talks about how to maximize the framework as a baseline for improving cybersecurity posture.