Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches
09/03/2016The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? Shawn Henry of CrowdStrike offers insight on how we need to evolve our core defenses.
-
Why Traditional Defenses Will Never Work Again
07/03/2016Webroot has just released its 2016 edition of its annual threat brief. In an exclusive interview, Michael Malloy, executive vice president of products and strategy, discusses the report and how its key findings will likely play out in the year ahead.
-
Advanced Threats: The Shift to Response
07/03/2016Threat response is a lot like physical fitness. Enterprises know what they need to do - they often just opt not to do it. RSA's Rashmi Knowles offers advice for how to move from threat prevention to response.
-
More Hackers Relying on Compromised Credentials
07/03/2016More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
-
Bringing CIA Cybersecurity Experience to Congress
07/03/2016Former intelligence operative Will Hurd brings his CIA values, including his belief in the benefits of sharing of threat information, to his job as chairman of a House subcommittee with information security oversight. Hurd addresses a number of cybersecurity matters in a wide-ranging interview.
-
Up Close: Verizon Data Breach Digest
05/03/2016Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
-
Apple Case Creates Important Policy Debate
04/03/2016Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.
-
VA Gov. McAuliffe on Cybersecurity
04/03/2016Virginia Gov. Terry McAuliffe has a message for state leaders across the nation: Cybersecurity has to be a top item on their policy platforms. And, by the way, he very much intends to make Virginia the cyber capital of the United States.
-
Tips on Protecting Against Ransomware Attacks
04/03/2016Healthcare organizations must take several important steps to protect their environments against ransomware attacks, says Mac McMillan, CEO of the security consulting firm CynergisTek. He outlines key measures in this interview.
-
Spotting Breaches by Studying Users
04/03/2016Organizations can apply user behavioral analytics - the practice of reacting to how people behave in the information security realm - to better spot and block data breaches, says Fortscale's Kurt Stammberger.
-
A CIO Describes InfoSec Recruiting Challenges
04/03/2016Finding security staff members with the right mix of technical qualifications and real-world experience is a difficult challenge, says Curt Kwak, CIO of Proliance Surgeons, who describes his strategies.
-
Using Predictive Analytics to Defend Against Emerging Threats
03/03/2016In light of the rapidly evolving cyber threat landscape, a top goal at University of Pittsburgh Medical Center is to identify and stop security incidents before the damage escalates, says John Houston, vice president, information security and privacy.
-
Emerging ID Management Issues for 2016
03/03/2016Identity management is going to be a big issue in 2016, and emerging authentication tools, such as biometrics, could very well gain a more significant foothold, although not without posing new risks, says Steve Martino, CISO at Cisco Systems.
-
Cloud Computing: The Security Concerns
03/03/2016Attacks against the cloud, using the cloud for command and control of malware attacks, and securing endpoints are posing big worries for all industries, says Brian Kenyon of Blue Coat Systems.
-
'Industrialization' of Cybercrime: Sizing Up the Impact
02/03/2016The "industrialization" of cybercrime, remote-access attacks and mobile-banking application and online-browser overlay attacks are trends the financial industry should monitor this year, says George Tubin of IBM Security Trusteer.
-
Are We Approaching Security Wrong?
01/03/2016Too many companies that provide cybersecurity solutions are failing to focus on helping organizations control risk at a reasonable cost, argues Malcolm Harkins, CISO at Cylance.
-
Why Bad Security Habits Are So Hard to Break
29/02/2016Despite the pervasiveness of data breaches, healthcare organizations are still playing catch-up on implementing strong, risk-based security programs, rather than focusing solely on HIPAA compliance, says David Finn of Symantec. He offers a preview of his session at the HIMSS 2016 Conference about a new survey.
-
DHS Eyes Malware Provenance to Identify Malicious Code
29/02/2016The Department of Homeland security sees malware provenance - which identifies the attributes of malicious codes - as a way to complement its signature-based Einstein intrusion detection and prevention systems to find malware that infects IT systems.
-
Adapting Cybersecurity Contests as a Recruitment Tool
24/02/2016Cybersecurity competitions are being adapted so employers can use them to vet the know-how of prospective employees, U.S. Cyber Challenge National Director Karen Evans says.
-
Cloud Security: It's Now an Enabler
24/02/2016It used to be that security was the one big barrier to organizations embracing the cloud. But Troy Kitch of Oracle says that not only is that barrier coming down, but now leaders are seeing cloud as a security enabler.