Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Responding to WannaCry Ransomware Outbreak
12/05/2017As organizations worldwide rush to mitigate the outbreak of the WannaCry crypto-locking ransomware, Adam Meyers of CrowdStrike shares insights on what researchers have gleaned from the attacks and how organizations should respond.
-
FDA Ramping Up Digital Health Cybersecurity Efforts
12/05/2017The Food and Drug Administration will soon launch a new centralized digital health unit that will address the cybersecurity of medical device software, Bakul Patel, who is overseeing the effort, explains in this in-depth interview.
-
Re-evaluating InfoSec Awareness' Place in Security Arsenal
12/05/2017An analysis on rethinking where awareness programs fit in cyberdefense strategies leads the latest edition of the ISMG Security Report. Also, James Comey's cybersecurity legacy at the FBI.
-
The Maturation of Cybercrime
09/05/2017An examination of the maturing of cybercrime leads the latest edition of the ISMG Security Report. Also, understanding the Intel Active Management Technology flaw.
-
2 Days to 2 Hours: Automating Application Vulnerability Management
09/05/2017Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Listen and learn how.
-
Deception Technology: A Primer
06/05/2017Security practitioners are debating the role deception technologies can play in a security strategy. But how does the latest technology actually work? Sahir Hidayatullah, CEO and co-founder of Smokescreen Technologies, offers some insights.
-
FBI's James Comey on Insider Threat, Other Cyber Challenges
05/05/2017The latest ISMG Security Report leads with an account of FBI Director James Comey's testimony before the U.S. Congress on insiders posing a cyberthreat to the American law enforcement bureau. Also, dissecting the claim that most startups fail shortly after being victimized by a cyberattack.
-
CISO in the Middle: Managing Risk Up and Down the Enterprise
02/05/2017When it comes to cyber risk, how must the CISO manage communications across the enterprise? The board, the staff and the line-of-business leaders all have different needs. Humphrey Christian of Bay Dynamics offers advice for the CISO in the middle.
-
Hackers Target Small Firms as Big Biz Toughens Cyber Defenses
02/05/2017An analysis on why small businesses are increasingly being targeted by hackers leads the latest edition of the ISMG Security Report. Also, potential medical device hacks pose risk to patients, and payment fraud evolves as the threat landscape intensifies.
-
Saber-Rattling and Cybersecurity: The Connection
01/05/2017So far this year, we've seen heightened tensions between the U.S. and adversaries in Russia, North Korea and Iran. How do these tensions manifest on the cyber stage? Tom Kellermann of Strategic Cyber Ventures talks about the cyberwar risks brewing below the surface.
-
Verizon's New Data Breach Report: An Analysis
28/04/2017In an in-depth interview, Verizon's Ashish Thapar analyzes the results of the company's latest Data Breach Investigations Report, noting, for example, the spread of cyberespionage in several sectors worldwide. He also shares insights on effective mitigation strategies.
-
Rethinking Cybersecurity: Lessons from Russian Hacks
28/04/2017The ISMG Security Report leads with an analysis of how tactics used by Kremlin-tied actors to target political groups in France, Germany and the U.S. to influence foreign elections could be employed to damage the reputation of businesses.
-
Ransomware Defense: The Do's and Don'ts
28/04/2017As ransomware attackers continue to hone their craft, defense also is evolving. Con Mallon of CrowdStrike discusses what to do - and what not to do - when your organization is struck by ransomware.
-
Medical Device Cybersecurity: The Risks to Patients
27/04/2017Although cyberattacks on medical devices that could potentially harm patients so far have only been demonstrated in lab settings, there have been actual cases involving the hacking of devices to gain access to patient data, says ethical hacker Stephanie Domas.
-
Why Focusing Too Much on Today's Cyber Threats Is a Bad Idea
25/04/2017Healthcare organizations must take a long view in their security risk management programs rather than focus on the "cyberthreat du jour," says security expert Bob Chaput, who explains why.
-
Pending Trump Cybersecurity Executive Order Outlined
25/04/2017Word that President Donald Trump's cybersecurity executive order could be unveiled in days leads the latest edition of the ISMG Security Report. Also, large Australian companies anticipate rise in information security risk.
-
Ransomware Kit Offered at Bargain-Basement Prices
21/04/2017A look at a Russian-speaking hacker offering novice cybercriminals a cheap way to conduct ransomware attacks leads the latest edition of the ISMG Security Report. Also, hear U.S. Homeland Secretary John Kelly address the cybersecurity challenges the federal government confronts.
-
Five Principles for Improving Medical Device Cybersecurity
19/04/2017Medical device manufacturers and healthcare entities should take five key cyber-related steps to help ensure patient safety, says Beau Woods of the grassroots cyber-safety advocacy group, I Am the Cavalry.
-
Improving Threat-Hunting and Incident Response
19/04/2017To shift from reactive to active defense mode, organizations need to get better at both threat-hunting and incident response. Tim Bandos of Digital Guardian discusses the tools and skills that are needed.
-
Next-Gen Biometric Authentication
19/04/2017Biometric adoption and demand by consumers is increasing rapidly. Next-gen solutions now exist for organizations to bring secure, frictionless authentication to their consumers using biometric solutions. Michael Lynch of InAuth shares insights.