PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 23 of 70

Going Beyond a 'Walled-Garden' Approach

Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that cannot operate in real time, says Matthew Moynahan, CEO at Forcepoint.

Sep 10, 2018

Digital Payments Security: Lessons From Canada

Canada, which has a head start on the adoption of digital payments, has learned some valuable security lessons that could be beneficial to the U.S., says Gord Jamieson of Visa. He'll be a featured speaker at ISMG's Fraud & Breach Prevention Summit: Toronto, to be held Sept. 11-12.

Sep 7, 2018

Why Managed Threat Hunting?

Increasingly, threat hunting is a practice that enterprises want to understand and implement. But it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters, says CrowdStrike's Jennifer Ayers.

Sep 7, 2018

Computer Voting: A 'National Disgrace'

The latest edition of the ISMG Security Report features Barbara Simons, co-author of the book "Broken Ballots," discussing why she believes it's a "national disgrace" that some states are relying on computer voting with no provision for recounts. Also: Update on breach lawsuit against Premera Blue Cross.

Sep 7, 2018

Demystifying DevSecOps and Its Role in App Security

DevOps and the addition of the "Sec" or security element to it has led to significant progress in moving security up in the application development chain, says Gartner's Dale Gardner

Sep 6, 2018

Why the Midterm Elections Are Hackable

With the midterm elections just around the corner, Barbara Simons, author of the election security book "Broken Ballots," explains why some voting computers remain inherently flawed.

Sep 5, 2018

A Fresh Look at Security Analytics

Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration? Drew Gidwani of ThreatConnect shares insight on how to maximize analytics.

Sep 5, 2018

Fintech Apps: Consumer Privacy Concerns Remain High

Nearly one-third of U.S. banking consumers use online and mobile fintech apps to help manage their money. But those users are concerned about data privacy and want more control over the financial data their apps can access, says David Fortney of The Clearing House, who reviews the results of a survey.

Sep 4, 2018

The 'Appropriate' Use of Analytics for Breach Detection

The appropriate use of predictive analytics, going beyond a "set it and forget it" approach, could dramatically improve breach detection, says Teresa Grogan, CIO of the consultancy VertitechIT .

Sep 4, 2018

Analysis: Russian Misinformation Campaign

The latest edition of the ISMG Security Report offers an update on how Russian bots and trolls are spreading misinformation on vaccines via social media - and the public health impact of the campaign. Plus: Tips on disaster recovery, internet of things security.

Aug 31, 2018

Securing IoT: Is It Feasible?

U.S. consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape.

Aug 29, 2018

Where's the "I" in Your IDaaS?

Industry analysts first coined the term Identity-as-a-Service, IDaaS in 2006. But today, the vast majority of IDaaS implementations still focus on the "A" - access management - leaving organizations to piece together the rest. IBM's Michael Bunyard discusses how to put "Identity" back in IDaaS.

Aug 29, 2018

Regulations Create Pressure to Take Privacy More Seriously

Companies that want to continue doing business globally will need to take privacy much more seriously, especially in light of increasingly strict new laws, ranging from the California Consumer Privacy Act to the EU's GDPR, says privacy and security expert Michelle Robles.

Aug 28, 2018

Paying Ransoms: More Cons Than Pros

The March SamSam ransomware attack in Atlanta is reported to have cost the city $17 million to resolve. The attackers had asked for a $51,000 bitcoin ransom, which the city refused to pay. But Gartner Research analyst Avivah Litan stresses that paying ransoms has more cons than pros.

Aug 27, 2018

Unsupervised Machine Learning: Fighting Cross-Channel Fraud

Unsupervised machine learning is essential to mitigate the sophisticated cross-channel fraud techniques attackers are using to take advantage of the multiple silos and security gaps at financial institutions, says ThetaRay's James Heinzman

Aug 24, 2018

Has the Ship Sailed on Securing Midterm Elections?

Leading the latest edition of the ISMG Security Report: An analysis of why it may be too late to secure the 2018 U.S. midterm elections. Also: A close look at the Anthem breach lawsuit settlement and a report on ransomware recovery lessons learned.

Aug 24, 2018

DirectTrust's Kibbe on the Future of Health Info Exchange

Although the outlook for advancing interoperable, secure national health information exchange is promising, many significant challenges still must be overcome, says David Kibbe, M.D., founding president and outgoing CEO of DirectTrust.

Aug 23, 2018

Modern Identity and Access Management: How to Build Trust without Sacrificing Security

<p>Tom Field and Naresh Persaud of CA Technologies reflect on key findings from their recent Executive Roundtable on Modern IAM.</p>

Aug 23, 2018

Analysis: Anthem Data Breach Settlement

Some terms of the recent $115 million settlement in the class action lawsuit against health insurer Anthem tied to a 2015 cyberattack appear underwhelming for the victims, says attorney James DeGraw, who explains why.

Aug 22, 2018

Banking Malware Targets Mexico; Will It Spread?

Kaspersky Lab has discovered a new form of malware it calls Dark Tequila that has been targeting users in Mexico and stealing bank credentials and other personal and corporate data. The malware can move laterally through a computer while it's offline, says Dmitry Bestuzhev, a Kasperksy researcher.

Aug 22, 2018

The Road to Business-Driven Security

<p>Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on business-driven security.</p>

Aug 22, 2018

Widespread Phishing Campaign Targets Financial Institutions

A phishing attack on Wednesday fueled by the Necurs botnet targeted at least 2,700 banking institutions of various sizes in the U.S. and around the world, explains Aaron Higbee of Cofense, which detected the attack.

Aug 17, 2018

The Industrial Internet of Things: Emerging Risks

Leading the latest edition of the ISMG Security Report: Chris Morales of the cybersecurity firm Vectra discusses how the industrial internet of things is changing the nature of industrial espionage and disruption.

Aug 17, 2018

Will AI and ML Make Security Cheaper?

Artificial intelligence and machine learning will have a significant impact on lowering the cost of securing an organization because it will reduce the need for advanced skillsets, predicts Rapid7's Richard Moseley.

Aug 14, 2018

Mobile/Web App Security: How Do You Know it's Working?

<p>Nick Holland and Chris Mizell of Arxan Technologies reflect on key findings from their recent Executive Roundtable on mobile security</p>

Aug 14, 2018

Are Legacy Medical Device Security Flaws Going Unfixed?

Many medical device makers appear to building better cybersecurity into their products, but some manufacturers are still avoiding fixing vulnerabilities in legacy devices that pose potential safety risks, says security researcher Billy Rios, who discusses the latest flaws in some Medtronic cardiac devices.

Aug 13, 2018

Tracking Cybersecurity Threats in Manufacturing

With the rise of the industrial internet of things comes a far broader attack surface in the manufacturing sector. Chris Morales of Vectra outlines findings of a new report on cyberattack trends in the manufacturing sector.

Aug 13, 2018

Managed Detection & Response for Financial Services

Ransomware. Phishing. Credential stuffing. These are among the top threats to financial institutions of all sizes. But small-to-midsized ones are particularly challenged to detect and respond to threats. Arctic Wolf's Todd Thiemann discusses the value of managed detection and response.

Aug 10, 2018

New Privacy Issues for Amazon

An analysis of the privacy issues Amazon will face as it dives deeper into the healthcare business leads the latest edition of the ISMG Security Report. Also featured: A preview of ISMG's Security Summit in New York Aug. 14-15.

Aug 10, 2018

HIPAA Security Rule Turns 20: It's Time for a Facelift

As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh.

Aug 10, 2018

The Global State of Online Digital Trust

Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is but one of the findings of the new 2018 Global State of Online Digital Trust study commissioned by CA Technologies. CA's David Duncan analyzes the results.

Aug 9, 2018

Training to Improve Support of Product Security

The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources.

Aug 8, 2018

Amazon's Healthcare Expansion: Analyzing Privacy Concerns

As Amazon expands its activities in healthcare, include a high-profile venture into the pharmacy business, the online retail giant will face a wide variety of important privacy issues, attorneys Jeffrey Short and Todd Nova explain.

Aug 6, 2018

Election Security Insights From Former Federal CISO

Retired Brigadier General Gregory Touhill, the first CISO of the federal government, spells out what he sees as the essential steps for fighting against Russian meddling in this year's midterm elections. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.

Aug 6, 2018

How to Secure US Elections - Before It's Too Late

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns.

Aug 3, 2018

Why the Use of Microsegmentation in Data Centers Is Growing

The need to secure cloud applications and address the security gaps in flat data center architectures is leading more organizations to adopt microsegmentation technology, says VMWare's Bruce Davie.

Aug 2, 2018

Fighting Election Meddling: A Three-Pronged Approach

What should President Donald Trump do to prevent Russian meddling in the midterm elections? Ed Amoroso, the former CISO of AT&T, offers three bold suggestions. He'll be a featured speaker at ISMG's Security Summit in New York, to be held Aug. 14-15.

Aug 1, 2018

Trailblazing CISO Stephen Katz Offers Cybersecurity Insights

What advice does the world's first CISO have for the current generation of CISOs? Stephen Katz emphasizes, first and foremost, that cybersecurity must be treated as a business risk management issue rather than a technology issue. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.

Jul 31, 2018

A New SOC Strategy in Light of Skills Shortage

A move to a "more autonomous" security operations center is helping Encompass Health cope with a shortage of skilled cybersecurity workers while improving its response to cyber threats, says Mitch Thomas, chief security officer.

Jul 30, 2018

A More Dynamic Approach to Cybersecurity

Data science is playing a fundamental role in a more dynamic approach to cybersecurity, says Jim Routh, CISO of Aetna, who stresses the importance of applying machine learning to front-line data security controls. Routh will be a featured speaker at the ISMG Security Summit in New York Aug. 14-15.

Jul 30, 2018

An FBI Update on Fighting Against Russian Election Meddling

This edition of the ISMG Security Report features Elvis Chan, a supervisory special agent at the FBI, discussing ongoing efforts to thwart Russian interference in the U.S. midterm election this fall, and Alberto Yepez of ForgePoint Capital addressing cryptocurrency security issues.

Jul 27, 2018

Blockchain for Identity Management: Early Examples

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.

Jul 25, 2018

Threat Hunting: How to Evolve Your Incident Response

<p>Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,</p>

Jul 25, 2018

Ransomware: Why Rapid Detection Is So Critical

Recent ransomware attacks against healthcare organizations and others demonstrate why rapid detection is critical to limiting the malware's damage, says cybersecurity expert Bill Dixon of Kroll.

Jul 24, 2018

Preparing for 3-D Secure: The Next Generation

Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.

Jul 23, 2018

SamSam: Inside One of the World's Top Forms of Ransomware

Since 2015, Sophos has investigated the SamSam ransomware campaign, and it has just released its findings in a new report. What can you learn from SamSam attackers' unique tools, techniques and protocols? Chester Wisniewski of Sophos shares insight.

Jul 23, 2018

Trump's Views on Russian Election Meddling: A History

This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.

Jul 20, 2018

A New Effort to Draft Medical Device Cybersecurity Guidance

An advisory group that includes a diverse array of members will spend the coming months devising detailed guidance on how to address the "shared responsibility" of medical device cybersecurity, explains Greg Garcia, who is leading the initiative.

Jul 19, 2018

Using Blockchain to Support a New Approach to ID Management

Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity."

Jul 18, 2018

Server Security: The Need for Deep Learning and Anti-Exploit

Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.

Jul 17, 2018