Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Why Cybercrime Now Exceeds Conventional Crime
15/09/2015Drawn by the potential for low risk and high reward, criminals worldwide are increasingly pursuing online crime instead of conventional forms of property crime, such as burglary and robbery, warns cybersecurity expert Alan Woodward.
-
Overcoming ID and Access Management Struggles
15/09/2015Pediatric hospitals face an assortment of ID and access management challenges when managing Web portals that provide access to patient data, says Cris Ewell, CISO at Seattle Children's Hospital.
-
How the FBI Helped Recover Millions from Wire Fraud
15/09/2015FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.
-
Fighting Fraud: New Insights from a Former FBI Agent
09/09/2015As criminals get more savvy about circumventing financial institutions' fraud prevention controls, fraud-fighting collaboration among institutions and law enforcement officials is becoming more important, says Clyde Langley, a former FBI agent who'll be a presenter at ISMG's Sept. 15 Fraud Summit San Francisco.
-
MIT Offers Online Cybersecurity Training
09/09/2015The Massachusetts Institute of Technology is launching a new online cybersecurity course that aims to fill a gap for IT professionals as well as business leaders, says MIT's Clara Piloto.
-
Securing Buy-in to Fight APT
09/09/2015Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.
-
Commercializing Federal IT Security Wares
08/09/2015The federal government is licensing a government-built anomaly detection tool known as PathScan to Ernst & Young, which, in turn, will refine the software and market it. In an interview, DHS's Mike Pozmantier explains why the government is offering its technology to the private sector.
-
Preparing for Upcoming HIPAA Compliance Audits
08/09/2015To prepare for next year's resumption of HIPAA compliance audits, organizations must be ready to demonstrate how they're complying with the revised breach notification rule and how they're providing patients with electronic access to records, says attorney David Holtzman.
-
APT Attacks Will Seek Smaller Targets
07/09/2015With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.
-
Exclusive: OCR's McGraw on Timing of HIPAA Audits
04/09/2015In her first interview since joining the HHS Office for Civil Rights as deputy director of health information privacy, Deven McGraw describes plans to relaunch HIPAA compliance audits next year and outlines other priorities.
-
FDA Official: More Medical Device Vulnerability Discoveries Are Likely
03/09/2015FDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use.
-
How Hackers Are Bypassing Intrusion Detection
02/09/2015More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.
-
Incident Response: Lessons Government Can Learn from Industry
02/09/2015Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.
-
InfoSec Careers: How to Attract, Retain More Women
02/09/2015Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.
-
Proactive Malware Hunting
01/09/2015If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.
-
Fighting Healthcare Payments Fraud
01/09/2015When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.
-
Hacker Havens: The Rise of Bulletproof Hosting Environments
31/08/2015Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.
-
Killing Bugs: Focus on 'Half-Life'
26/08/2015CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
-
Protecting Research Data: What Works?
26/08/2015One of the most difficult challenges in protecting sensitive patient data that's used in medical research is educating researchers and other clinicians who share that data about potential privacy issues, says Dave Summitt of Moffitt Cancer Center in Florida.
-
Venture Capitalist: 'I'm Still Bullish'
24/08/2015By the time venture capitalist Alberto Yépez had breakfast on Monday, global markets had plunged, and the Dow had lost 1,000 points and gained back nearly 900. His message to cybersecurity investors about the volatile market: "I'm still bullish."