Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Impact of Economically Weaker China on Cyber Spying

    24/08/2015

    Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.

  • A CISO's Strategy for Fighting Phishing Attacks

    24/08/2015

    Hacker attacks often start with spear-phishing attempts, but healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami, who describes her organization's approach.

  • Mitigating Organizational Risks After the Ashley Madison Leaks

    24/08/2015

    To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.

  • 3 InfoSec Woes Plaguing Federal Agencies

    19/08/2015

    An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.

  • Why It's OK to Hack for Spying

    17/08/2015

    Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.

  • How 'Neglect' Made Healthcare No.1 Target

    14/08/2015

    After years of neglecting data security, the healthcare sector has only itself to blame for making itself an easy target for hackers, says David Kibbe, M.D., president and CEO of DirectTrust.

  • Is Windows 10 Secure for the Enterprise?

    14/08/2015

    The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.

  • How Will FBI Examine Hillary's Server?

    13/08/2015

    How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.

  • The Levels of Mobile Security

    13/08/2015

    Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.

  • Breached Retailer: 'I Wish I Had Known How Sophisticated ...'

    12/08/2015

    In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.

  • DHS Appoints Key Cybersecurity Leader

    12/08/2015

    DHS Secretary Jeh Johnson taps Andy Ozment, assistant secretary of the Office of Cybersecurity and Communications, to undertake overall and direct charge for the National Cybersecurity and Communications Integration Center.

  • Re-Assessing the Skills Gap

    06/08/2015

    Enough talk about the cybersecurity skills gap; it's time for a new strategy for filling it, says ISACA's Eddie Schwartz. The new CSX Practitioner certification is a step in the right direction, he says.

  • Lessons from Gameover Zeus Takedown

    05/08/2015

    The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.

  • Partnering With HR to Prevent Breaches

    05/08/2015

    Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.

  • Ex-FBI Official on Why Attribution Matters

    05/08/2015

    Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.

  • Needle in a Haystack: Finding Malware

    04/08/2015

    Georgia Tech researchers are attempting to develop new processes and technologies to more easily detect malware. The goal, researcher Wenke Lee explains, is to find an effective way to identify and expunge advanced persistent threats

  • Security: The New Measure of Success

    04/08/2015

    "Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.

  • Sea-to-Sea: China Hacks in U.S.

    02/08/2015

    An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.

  • Threat Intelligence - Context is King

    31/07/2015

    Organizations are jumping on the threat intelligence bandwagon, but are they making strategic investments? Often not, says BrightPoint Security's Rich Reybok, who says "context" is often the key missing element.

  • Targeted Attacks: How Ready is Japan?

    30/07/2015

    Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.

página 95 de 143