PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 32 of 70

Creating a Hack-Proof Computer

The technology and know-how exists to build a hack-proof computer, but doing so won't be easy, says Howard Shrobe, principal research scientist at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory.

Feb 27, 2017

LeakedSource's Demise: Lessons Learned

Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.

Feb 24, 2017

Moving Away from Checkbox Compliance

Leading the latest version of the ISMG Security Report: a look at how various sectors are moving away from checkbox compliance, instead taking proactive measures to secure their information assets. Also, big increase in e-commerce fraud and Yahoo's costly breach.

Feb 24, 2017

Dark Web: 5 Things to Know

What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs.

Feb 24, 2017

Securing Data Beyond 'The Walled Garden'

Emerging insider threats have quickly proven that the proverbial "walled garden" is not so walled after all, and without true end-to-end encryption, insiders and outsiders can compromise sensitive data, says Dr. Phillip Hallam-Baker of Comodo Group.

Feb 23, 2017

'Retrospection' Backtracks Detection of Intrusions

Through a technique known as "retrospection," organizations can replay attacks, going back to scan their networks for malware identified after their networks were infected, says Ramon Peypoch of Protectwise.

Feb 23, 2017

Investigating Blockchain's Role in Health Info Exchange

Federal regulators are considering the role that blockchain technology could play in advancing the secure exchange of healthcare information, says Steve Posnack of the Office of the National Coordinator for Health IT, who explains ongoing research efforts.

Feb 23, 2017

Is Healthcare's Cybersecurity Attitude Changing?

Could attitudes about cybersecurity in the healthcare sector be at a tipping point? A new study shows a shift from a focus on compliance to managing business risks, says David Finn, health IT officer at Symantec.

Feb 23, 2017

ROI of Vendor Risk Management

Organizations across sectors have come to understand the inherent security risks posed by third-party vendors. But too many approach vendor risk management with a manual process, says Daniel de Juan of Rsam.

Feb 23, 2017

What's Ahead for Trump on Cybersecurity Initiatives?

Ari Schwartz, former special assistant to the president and senior director for cybersecurity in the Obama administration, sizes up what cybersecurity actions the Trump administration could take.

Feb 22, 2017

Javelin: Card-Not-Present Fraud Jumped 40% in 2016

Card-not-present fraud skyrocketed in 2016, jumping 40 percent from 2015, according to new research, says Al Pacqual of Javelin Strategy & Research, who analyzes the reasons why.

Feb 22, 2017

Faster Breach Detection via Analytics

Organizations are increasingly turning to user behavioral analytics to help more quickly detect new attacks - emanating from inside or outside the enterprise - as well as mitigate those threats, says CA's Mark McGovern.

Feb 22, 2017

Analysis: Shift from Data Hacks to Ransomware in Healthcare

Major healthcare breaches involving hackers accessing patient information soared in 2016. But now more cybercriminals are shifting their attention to ransomware attacks because of the glut of stolen health information hitting the black market, says Dan Berger of CynergisTek.

Feb 22, 2017

The Growth of IoT Litigation, Regulation

As more IoT devices are compromised to wage large-scale attacks, related litigation and regulatory scrutiny will grow, which means device manufacturers - and users - could be held more accountable, says Richard Henderson, global security strategist at Absolute.

Feb 22, 2017

Smaller Financial Institutions Struggle with Cyber Resilience

Increasing regulatory oversight is overwhelming smaller banks and credit unions, pushing them to continue to focus more on compliance than overall cybersecurity and resilience, says Sean Feeney, CEO of Defense Storm.

Feb 22, 2017

The Case for Solutions Integration

Staying current in threat detection is key, which is why more security companies need to embrace a more open way of thinking when it comes to solutions integration, says Christopher Kruegel, CEO of Lastline.

Feb 22, 2017

Will a Pending OCR Rule Impact Breach Class-Action Suits?

A pending federal regulation - called for under the HITECH Act - that would allow regulators to share with breach victims money collected in HIPAA violation cases eventually could have implications for class-action breach lawsuits, says privacy attorney Adam Greene.

Feb 22, 2017

Stopping Phishing Attacks More Quickly

Because most malware is spread via phishing, experts at Webroot are focusing their attention on stopping phishing attacks before they have a chance to infect a system with malicious code, says David Dufour, the company's senior director of engineering and cybersecurity.

Feb 22, 2017

The Role of Omnichannel Risk Analysis

Risk analysis is at the core of most card fraud prevention platforms used today, says Carol Alexander of CA Technologies. But what if the industry could take the lessons it's learned to other channels, enabling banking institutions to more readily identify potentially fraudulent transactions before they happen?

Feb 22, 2017

Trend Micro: Why Most Cybersecurity Startups Won't Survive

The honeymoon period for smaller players in cybersecurity is nearing an end, predicts Trend Micro CTO Raimund Genes. Achieving profitability has proven to be challenging for startups, while more established companies are thriving, he contends.

Feb 21, 2017

The Security Business Case for User Behavior Monitoring

By applying analytics to user behavior, organizations can better prioritize the actual risks facing their business, thus helping cut through the sheer volume of security alerts they face daily, says Doug Copley, deputy CISO of Forcepoint.

Feb 21, 2017

The Rise of Software-Defined Secure Networks

Attackers continue to target enterprise assets both from outside and - too often - inside the corporate perimeter. To help, more organizations are turning to software-defined secure networks, says Mihir Maniar of Juniper Networks.

Feb 21, 2017

Former ONC Privacy Chief on Healthcare's Cyber Challenges

To help prepare for ever-evolving cyber threats, healthcare entities need to learn from the security practices of other sectors, says Lucia Savage, former chief privacy officer at the Office of the National Coordinator for Health IT.

Feb 21, 2017

Access Management in Healthcare Evolves

Because so many healthcare organizations are growing through mergers and acquisitions at a time when cyber threats are multiplying, effective access control is becoming increasingly important - and more complex, says Joe Meyer of the security consulting firm NCC Group.

Feb 21, 2017

Data Integrity in the Era of Fake News

An analysis of integrity - a core foundation of cybersecurity - in the era of fake news leads the latest edition of the ISMG Security Report. Also, a new initiative aims to help ensure the security of medical devices and financial institutions in New York face new state cybersecurity regulations.

Feb 21, 2017

HIPAA Compliance Audits: The Very Latest Details

Plans to launch some onsite HIPAA compliance audits are now on hold while the agency that enforces HIPAA completes more than 200 desk audit reports, says Deven McGraw, deputy director of the Department of Health and Human Services' Office for Civil Rights.

Feb 20, 2017

Trapping Hackers Via BEC Attacks, Email Spoofing

Fooling hackers into giving up traceable information about themselves through "reflective" social engineering is helping researchers curb fraud losses and protect would-be victims, say Dell Secureworks researchers Joe Stewart and James Bettke.

Feb 20, 2017

A New Way to Report Medical Device Vulnerabilities

A new website is now available for reporting medical device vulnerabilities, says Dale Nordenberg, M.D., executive director of the Medical Device Innovation, Safety and Security Consortium, who explains how MD-VIPER works in this in-depth interview.

Feb 20, 2017

A CISO Outlines Breach-Fighting Efforts

The uptick of ransomware and other cyberattacks in the healthcare sector has prompted healthcare provider RWJBarnabas Health to make a number of important moves to help prevent, detect and respond to breaches, says CISO Hussein Syed.

Feb 17, 2017

RSA 2017: Voices of InfoSec Thought Leaders

This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."

Feb 17, 2017

US Rep. Michael McCaul on Homeland Cybersecurity

U.S. Rep. Michael McCaul says Washington must accept that we are losing on the global cyber battlefield. But the Homeland Security Committee chairman contends the Trump administration has the opportunity to turn the tide by prioritizing cybersecurity and investing the right resources in partnerships and defense.

Feb 15, 2017

Epidemiology, Immunology, Genetics Echo in InfoSecurity

A discussion on how the understanding of epidemiology, immunology and genetic research processes can help developers create methods to secure information systems leads the latest episode of the ISMG Security Report. Also featured: insights on strengthening ATM defenses.

Feb 14, 2017

Secure Coding: The Rise of SecDevOps

For too long, ensuring that code is securely written - and bug free - has been a business afterthought. But there's been new hope for building security into the development lifecycle, thanks to the rise of DevOps, aka rugged software, says Chris Wysopal, CTO of the application security firm Veracode.

Feb 10, 2017

Evaluating Impact of Lawful Hacking, Metadata

In this edition of the ISMG Security Report: An evaluation of the challenges law enforcement faces in using lawful hacking and metadata as an alternative way to collect evidence when cracking an encrypted device is not an option. Also, a look at Trump's revised cybersecurity executive order.

Feb 10, 2017

What Security Professionals Can Learn From Epidemiologists

Just like epidemiologists studying disease outbreaks, cybersecurity professionals can benefit from identifying and mitigating certain behaviors, says Dr. Elizabeth Lawler, an epidemiologist who is CEO of Conjur, a data security firm.

Feb 9, 2017

Tips for Preventing Business Associate Breaches

Plenty of healthcare organizations have been stung by data breaches caused by their business associates. That's one reason why Beaufort Memorial Hospital has been taking a variety of measures to help prevent reportable incidents involving its BAs, says CIO Ed Ricks.

Feb 8, 2017

"Why Can't We Solve Phishing?"

We know why phishing works; we know how it works. And yet the schemes still succeed, and they're only getting more effective. How can we stop phishing? Jim Hansen of PhishMe has some ideas, and they just might surprise you.

Feb 8, 2017

How Will Trump Administration Ensure Healthcare InfoSec?

In this edition of the ISMG Security Report: an analysis of a major fine against a Texas hospital and its implications for how the Trump administration might enforce HIPAA rules. Also, an IRS-related phishing scheme targets businesses.

Feb 7, 2017

Expert Analysis: Improving Medical Device Cybersecurity

Karl West, CISO of Intermountain Healthcare, and Mike Nelson, vice president of healthcare solutions at DigiCert, provide an analysis of the FDA's recent guidance on cybersecurity for medical devices. They'll also be speaking on that topic at the HIMSS 2017 Conference in Orlando, Fla.

Feb 6, 2017

Post-Manning: Malicious Insider Defenses Evolve

When Army intelligence specialist Chelsea Manning leaked classified documents to WikiLeaks in 2010, the federal government's security clearance process served as the main defense against malicious insiders. CERT's Randy Trzeciak explains how insider threat defenses have changed since then.

Feb 6, 2017

Defending DHS Against the Insider Threat

A report on passage by the House of Representatives of a bill aimed at toughening insider threat defenses at the Department of Homeland Security leads the latest edition of the ISMG Security Report. Also, analyzing the use of blockchain technology to secure healthcare data.

Feb 3, 2017

What It Takes to Achieve Digital Trust

With great efficiencies and cost savings also come great threats and fraud risks. This is today's digital reality, and it is why cybersecurity and the user experience need to be aligned to create digital trust, says Scott Clements of VASCO Data Security.

Feb 2, 2017

OT vs. IT Security: The Need for Different Approaches

Cybersecurity strategies developed for data-centric information technology are not necessarily suitable for protecting operational technology, where availability, rather than confidentiality, is the key security concern, says Vikram Kalkat of Kaspersky Lab.

Feb 2, 2017

Could Blockchain Support Secure Health Data Exchange?

Blockchain, the distributed ledger technology for cryptocurrency, has the potential to improve the privacy and security of health information exchange, says Shahram Ebadollahi, vice president of innovations at IBM Watson, which is collaborating with the FDA on a research project.

Feb 1, 2017

Ransomware Didn't Hold Austrian Hotel Guests Hostage

This edition of the ISMG Security Report debunks recent reports suggesting that Austrian hotel guests were locked into - and out of - their rooms by ransomware. Also, would a cybersecurity executive order from U.S. President Donald Trump advance the nation's existing efforts?

Jan 31, 2017

Why Court Revived Breach-Related Case Against Horizon BCBS

Attorney Steven Teppler analyzes the significance of a federal appellate court's ruling vacating a lower court's decision to dismiss a class action lawsuit against Horizon Blue Cross Blue Shield that was filed in the wake of a breach affecting 840,000 individuals.

Jan 27, 2017

Gartner's Litan on Endpoint Detection, Behavioral Analytics

Gartner analyst Avivah Litan has long been the go-to expert for insights on fraud detection. Now she has broadened her focus to cover endpoint security and user and entity behavioral analytics. Where do these topics converge, and what insights can she share on the 2017 cybersecurity outlook?

Jan 27, 2017

White House Staffers Used an RNC Private Email Server

This edition of the ISMG Security Report leads with news that several senior White House staffers had been using a private email server. Also, fueled by worries over Russian hacking, the Australian government plans to educate political parties on improving cybersecurity.

Jan 27, 2017

HIPAA Enforcement Under Trump: A Forecast

Privacy and security attorney Kirk Nahra offers a forecast for how the Trump administration might address various health data security issues, including HIPAA enforcement, and an assessment of the Obama administration's record on those issues.

Jan 26, 2017

Privileged Access Management: Break the Kill Chain

Targeted breaches are increasing and they share a common thread - a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.

Jan 25, 2017