Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
What 'Indicators of Exposure' Reveal
21/07/2016By tracking "Indicators of Exposure" - the top techniques attackers could use to hack into any individual enterprise - organizations can better defend themselves against network intrusions and data breaches, says Gidi Cohen, CEO of Skybox Security.
-
Top Cyber Expert on Rethinking Approach to IT Security
19/07/2016Examining the human factor in the age of cyber conflict and the new healthcare challenge concerning ransomware highlight this edition of the ISMG Security Report. Also, hackers target the Republican convention.
-
FireEye on Extortion: To Pay or Not to Pay?
18/07/2016FireEye has dealt with more disruptive data breaches over just the past year than it has since the company was founded 12 years ago. Charles Carmakal, vice president with the company's Mandiant forensics unit, shares tips for handling a breach.
-
U.K. Prime Minister Theresa May's Record on Cybersecurity
15/07/2016An analysis of the record of the U.K.'s new prime minister, Theresa May, on cybersecurity and online privacy and a report on efforts to create an antidote to ransomware highlight this edition of the ISMG Security Report.
-
Obama Sees Need to Improve Federal Government IT Security
12/07/2016In the wake of the controversy over Hillary Clinton's use of private email servers, President Obama voices his concerns about the state of federal government IT security in this edition of the ISMG Security Report.
-
Mitigating 'Shadow IT' Risks
11/07/2016In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
-
Anti-Virus Ruckus; Real Impact Over Hillary's Email Server
08/07/2016A bitter battle flares up in the fiercely competitive endpoint protection products market, and uncovering the real impact over Hillary Clinton's email server. These items highlight this edition of the ISMG Security Report.
-
Debating Hillary's Email Server: The Missing Element
07/07/2016Missing from the analysis and debate regarding the U.S. government's decision not to prosecute presumptive Democratic Party presidential candidate Hillary Clinton for using a private email server while secretary of state is this simple fact: Secure IT systems aren't tailored to function the way people behave.
-
Hiring Cybersecurity Staff Outside the 'IT Box'
06/07/2016One of the unforeseen advantages of the so-called "brain-drain" in cybersecurity is that organizations have had to think outside the IT box and hire staff that don't fit the traditional computer science mold. Jen Miller-Osborn of Palo Alto Networks discusses why diverse backgrounds benefit security.
-
How NIST Framework Fosters Collaboration
06/07/2016One of the core values of the cybersecurity framework is to facilitate communication among various stakeholders coming from different technical and managerial backgrounds who must collaborate to build secure IT systems, NIST Program Manager Matt Barrett explains in an interview.
-
Heartbleed Update: America the Vulnerable
05/07/2016More than 200,000 internet-connected systems remain vulnerable to the OpenSSL vulnerability known as Heartbleed, more than two years after the flaw was publicly announced and related patches released, warns security researcher Billy Rios.
-
Ukraine Sees Bank Heist, Organizations Crave Deception
05/07/2016Now a Ukraine bank has reported suffering a $10 million hacker heist via fraudulent SWIFT transfers. Also hear about why attackers often use legitimate IT administrator tools, and organizations' growing use of deception technologies and strategies.
-
PCI-DSS: The Asian Journey to Compliance
05/07/2016The need for PCI-DSS compliance is being embraced in Southeast Asia and the Middle East, with adoption of PCI standards increasing dramatically over the last five years, says Dharshan Shanthamurthy, CEO of SISA Information Security, who shares insights about why PCI adoption is likely to continue to grow.
-
'Dark Overlord' Deals Data, and Congress Tackles Crypto
01/07/2016The Dark Overlord selling stolen healthcare databases for bitcoins leads the ISMG Security Report. Also hear about banks' move toward real-time transaction fraud controls and a bipartisan attempt in Congress to tackle the ongoing crypto and "going dark" debates.
-
Visa Acknowledges EMV Rollout Pain
30/06/2016So why is Visa temporarily reducing the fraud chargeback burden on non-EMV-compliant U.S. merchants? Mark Nelsen, Visa's senior vice president, says it boils down to this: The card brand wants to give retailers a break while it takes steps to streamline the cumbersome certification of new POS devices.
-
Improving Fraud Prevention After SWIFT-Related Heists
30/06/2016In the wake of recent SWIFT-related interbank payment heists, more banks are monitoring transactions for anomalous behavior in an attempt to catch fraud in real time, says Andrew Davies, a fraud prevention expert at core banking services provider Fiserv.
-
Adjusting Security Controls for Evolving Threats
29/06/2016Healthcare organizations must do much more to continually measure the effectiveness of their security controls as new cyber threats emerge and evolve, Lisa Gallagher of PricewaterhouseCoopers, formerly of HIMSS, says in this in-depth interview.
-
Brexit Shocker, and Cybercrime Forum Sells Server Access
28/06/2016Britain's surprise vote to "Brexit" the European Union leads the ISMG Security Report. Also hear analysis on a cybercrime forum selling remote server access; Comodo being in hot water by saying "let's encrypt"; and why Facebook CEO Mark Zuckerberg covers his webcam with tape.
-
PCI-DSS: Building Global Acceptance
27/06/2016Achieving international acceptance of PCI-DSS is an ongoing challenge, says Jeremy King, international director of the PCI Security Standards Council, who's working to educate merchants about baseline security that goes far beyond cardholder data protection.
-
Roundup: Fraud Crackdown; Gov't Sensitive Info at Risk
24/06/2016In this edition of the ISMG Security Report, you'll hear reports on the U.S. government nabbing healthcare fraudsters; federal agencies at risk of exposing highly sensitive data; and the hacking of brokerage accounts.