Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • No-Brainer Ransomware Defenses

    22/06/2016

    With ransomware attacks surging, all organizations should ensure they have an enterprise backup and disaster recovery plan in place, and eliminate all unnecessary, outdated or disused applications and services running on endpoints and servers, says ESET's Mark James.

  • Reimagining API Creation

    21/06/2016

    There is no such thing as "security by obscurity." Attackers can hack what they can't see. This means organizations must reimagine the fundamentals of API creation, says Jaime Ryan of CA Technologies.

  • Update: Ransomware, Digital Currency, Virtual Reality

    21/06/2016

    In this edition of the ISMG Security Report, you'll hear our editors explore how hackers use Java script for ransomware, the latest digital currency security issue and privacy threats posed by virtual reality.

  • The CASB Challenge: APIs or Proxies?

    21/06/2016

    In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control. Which is better approach to CASB - proxy or API? Rohit Gupta of Palerra shares his insight and recommendations.

  • Breach Aftermath Planning: Focus on Saving Your Business

    20/06/2016

    Crisis management expert Emily Mossburg discusses a new Deloitte study that shows why many organizations must reassess their approach to breach response to focus on what really matters: keeping the organization functioning.

  • Watergate and DNC Breach: Impact of 2 Types of Break-Ins

    17/06/2016

    The ISMG Security Report kicks off with thoughts on how Watergate - its 44th anniversary is today - would have turned out differently if today's technology existed in 1972. Also, you'll hear the backstory on the breach at Democratic Party headquarters revealed this past week.

  • 'Space Rogue' on Déjà Vu Security Failures

    15/06/2016

    With rampant password, patch management and data missteps, it can feel like information security déjà vu all over again as security professionals fight so many of the same battles as 10 or 20 years ago, says white hat hacker Cris Thomas, a.k.a. "Space Rogue."

  • IBM Brings 'Watson' Supercomputer to Cybersecurity Fight

    14/06/2016

    IBM is deploying its Watson supercomputer to help organizations answer this essential question: In the face of nonstop security events, potential intrusions and patches, what's the next, best action that an organization's security analyst should take?

  • Symantec's Latest Buy; Mobile App Woes

    14/06/2016

    In the latest ISMG Security Report, our editors analyze Symantec's pending purchase of Blue Coat; vulnerabilities in mobile banking apps; retailers' objections to a national data breach notification bill; and the relaunching of the IRS Get Transcript tool after a breach.

  • Anatomy of a DDoS Attack

    14/06/2016

    For years, organizations have been threatened by DDoS attacks on several fronts, ranging from volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks. Trey Guinn of CloudFlare discusses how to respond to each type of attack.

  • Analysis: FTC's Privacy Settlement with EHR Vendor

    13/06/2016

    A settlement between the Federal Trade Commission and Practice Fusion, an electronic health records system vendor, serves as a reminder that regulations other than HIPAA apply to protecting patient privacy, says attorney Adam Greene, a healthcare regulations expert.

  • Retailers: Don't Require Us to Meet Bank Security Standards

    13/06/2016

    The Retail Industry Leaders Association is battling against passage of a national data security and breach notification bill known as the Data Security Act of 2015, arguing it would unreasonably require retailers to meet some of the same security standards as banks, says Austen Jensen, a RILA vice president.

  • Determining If a Ransomware Attack Is a Reportable Breach

    10/06/2016

    While awaiting new guidance from the HHS Office for Civil Rights, healthcare organizations can take several steps to help determine whether a ransomware attack is a reportable breach under HIPAA, says compliance attorney Betsy Hodge.

  • Audio Report: Updates on Infosec Europe, NIST Framework

    10/06/2016

    In the latest ISMG Security Report, our editors examine the top concerns of security practitioners gathered at Infosecurity Europe, NIST's planned revision of its cybersecurity framework and U.S. government efforts to make sure patients can securely access their electronic health records.

  • Tackling the D.C. Security Skills Crisis

    09/06/2016

    The scale of the global IT security skills crisis is well documented. But what is its direct impact on cybersecurity with the government agencies of Washington, D.C.? Dan Waddell of (ISC)² discusses the problem - and a new way to address it.

  • Report: Most Phishing Emails Pack Ransomware

    08/06/2016

    Cybercrime alert: In March, 93 percent of all phishing emails studied contained ransomware designed to forcibly encrypt PCs, says PhishMe chief operating officer Jim Hansen. In an interview, he offers insights on how to respond.

  • Simple Security: How Organizations Fumble the Basics

    08/06/2016

    Many organizations still fail to practice smart web security, warns penetration testing expert Ilia Kolochenko, who notes that 23 percent of all websites still use SSL version 3, despite it leaving them at risk from POODLE and BEAST attacks.

  • NIST Plans Cybersecurity Framework Update

    07/06/2016

    NIST plans next year to clarify certain provisions in its cybersecurity framework. "Just to be clear, we're not headed toward a version 2.0 right now," Program Manager Matt Barrett explains in an interview. "We're headed to something that's more like a 1.1."

  • The Backstory Behind the SWIFT-Related Thefts

    07/06/2016

    This ISMG Security Report features a discussion of the impact on the global financial services industry of the SWIFT-related theft of $81 million from Bangladesh's central bank and similar thefts. You'll also hear reports on making IT systems more trustable and national governments' spending on cybersecurity.

  • Analyzing the Cybersecurity Framework's Value

    03/06/2016

    In this special edition of the ISMG Security Report, a panel of top cybersecurity thought leaders analyzes the value of the Obama administration's cybersecurity framework and its long-term impact.

página 84 de 143