Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Analysis: The Significance of Russian Hackers Indictment

    Analysis: The Significance of Russian Hackers' Indictment

    23/10/2020

    The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.

  • The IRS Takes on Cryptocurrency-Funded Terrorists

    The IRS Takes on Cryptocurrency-Funded Terrorists

    22/10/2020

    The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.

  • Analysis: Ransomware Dominates the Cybercrime Landscape

    Analysis: Ransomware Dominates the Cybercrime Landscape

    16/10/2020

    The latest edition of the ISMG Security Report analyzes a new report that labels ransomware as the No. 1 cybercrime threat. Also featured: A former FBI agent offers an update on "disruptionware" attacks; how Tesla's autopilot is tricked by phantom images.

  • Analysis: Why Regulators Got Tough With HM

    Analysis: Why Regulators Got Tough With H&M

    09/10/2020

    The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule. Also featured: The coming of age of digital identities; deputy CSO at Mastercard on top priorities for 2021.

  • Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers

    Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers

    05/10/2020

    In an exclusive interview, Roger Severino, director of the HHS Office for Civil Rights, which enforces HIPAA, spells out critical steps healthcare organizations must take to safeguard patient information and ensure patient safety in light of the surge in ransomware and other hacking incidents.

  • Why Digital Identity Is Gaining Momentum

    Why Digital Identity Is Gaining Momentum

    05/10/2020

    Digital identity is coming of age as a way to enable COVID-19 contact tracing, crack down on payment fraud and much more, says Tony Craddock of the Emerging Payments Association.

  • Analysis: McAfees Planned IPO

    Analysis: McAfee's Planned IPO

    02/10/2020

    The latest edition of the ISMG Security Report analyzes cybersecurity firm McAfee's plans to again become a publicly traded company. Also featured: 'Zero trust' strategic insights and an IoT security flaw saga.

  • Compliance With 2 New Health Data Regs: Avoiding Pitfalls

    Compliance With 2 New Health Data Regs: Avoiding Pitfalls

    29/09/2020

    As the compliance dates approach for the Department of Health and Human Services' information blocking and health IT interoperability final rules, organizations need to avoid potential pitfalls, says privacy attorney Adam Greene.

  • Analysis: Are Darknet Markets Here to Stay?

    Analysis: Are Darknet Markets Here to Stay?

    25/09/2020

    The latest edition of the ISMG Security Report features an analysis on why criminals continue to use darknet markets, despite the risks. Also featured: Hackers target Virgin Mobile KSA; coping with COVID-19 stress.

  • Analysis: Is Chinese Database Exposure a Cause for Concern?

    Analysis: Is Chinese Database Exposure a Cause for Concern?

    18/09/2020

    The latest edition of the ISMG Security Report analyzes whether a leaked database compiled by a Chinese company should be a cause for serious concern. Also featured are discussions on vulnerability disclosure challenges and risks posed by using social media apps for payments.

  • Ransomware Gangs Find Fresh Ways to Make Victims Pay

    Ransomware Gangs Find Fresh Ways to Make Victims Pay

    11/09/2020

    The latest edition of the ISMG Security Report analyzes how criminals keep finding new ways to make ransomware victims pay. Also featured: Preventing digital currency counterfeits; a proposed health data privacy framework.

  • Fed Studies Development of Digital Dollar

    Fed Studies Development of Digital Dollar

    10/09/2020

    The pandemic has accelerated the shift to e-commerce and raised new concerns about the use of paper money. Jim Cunha of the Federal Reserve Bank of Boston describes a collaborative research project with the Massachusetts Institute of Technology to determine the feasibility of a digital alternative.

  • How Organizations Can Leverage SASE

    How Organizations Can Leverage SASE

    08/09/2020

    The secure access service edge model, or SASE, treats identity as the new perimeter, says Lee Dolsen Singapore-based chief architect for Zscaler in the Asia Pacific region, who offers implementation insights.

  • Privacy Framework Proposed to Address HIPAA Gaps

    Privacy Framework Proposed to Address HIPAA Gaps

    07/09/2020

    The eHealth Initiative and the Center for Democracy and Technology are seeking feedback on their draft privacy framework that addresses gaps in legal protections for consumer health data falling outside of HIPAA's regulatory umbrella, says eHI CEO Jennifer Covich Bordenick.

  • Key Considerations for Privileged Access Management

    Key Considerations for Privileged Access Management

    07/09/2020

    Recent hacking incidents, including one targeting Twitter, are raising awareness of the importance of privileged access management, says David Boda, group head of information security for Camelot Group, operator of the U.K. National Lottery. He describes PAM best practices.

  • The Risks Posed by Mobile Health Apps

    The Risks Posed by Mobile Health Apps

    04/09/2020

    What privacy and security issues are raised by patients using smartphone apps to access health records? Attorney Helen Oscislawski and security expert Jarrett Kolthoff offer an analysis.

  • Equifax Breach: CISO Describes Lessons Learned

    Equifax Breach: CISO Describes Lessons Learned

    04/09/2020

    The latest edition of the ISMG Security Report features a discusssion with Equifax CISO, Jamil Farshchi, on the lessons learned from the credit reporting firm's massive data breach three years ago. Also featured: Australians' driver's licenses leaked; privileged access management tips.

  • Building Privacy-Centered Contact-Tracing Apps

    Building Privacy-Centered Contact-Tracing Apps

    02/09/2020

    Contact-tracing apps are continuing to take shape around the world as the COVID-19 pandemic continues. Using privacy-by-design principles is critical to building trust in these apps, says privacy expert Ann Cavoukian.

  • Improving the Detection of Medicare Fraud

    Improving the Detection of Medicare Fraud

    28/08/2020

    Hospitals and other healthcare organizations can help prevent Medicare fraud by "having robust processes in place for employees to report fraud," says fraud mitigation expert Louis Rossignuolo, managing director of investigations at Altomonte Advisory Group.

  • Analysis: The Unusual Case Against Former Uber CSO

    Analysis: The Unusual Case Against Former Uber CSO

    28/08/2020

    The latest edition of the ISMG Security Report analyzes the unusual case against former Uber CSO, Joe Sullivan, who was charged in connection with allegedly covering up a data breach. Also featured: CISA director on election security; insights on preventing healthcare fraud.

página 1 de 136

Informações: