PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 35 of 70

Why Cybercrime Is On the Rise; Update on Threat Info Sharing

The latest ISMG Security Report leads off with a discussion with <i>DataBreachToday</i> Executive Editor Mathew J. Schwartz on why online cybercrime is growing. Also, the status of the U.S. government's cyberthreat information sharing initiative.

Sep 30, 2016

Mitigating Fraud Risks for Same-Day ACH

In the wake of this week's rollout by NACHA, The Electronic Payments Association, of same-day ACH payments in the U.S., fraud departments at originating and receiving banks should be bracing for the new risks posed by faster payments, says NACHA's Jane Larimer, who offers insights on steps to take.

Sep 28, 2016

Research Reveals Why Hacked Patient Records Are So Valuable

Why are hacked healthcare records so valuable? It's because stolen patient records often end up for sale on the deep web as part of information packages called "fullz" and "identity kits" used by fraudsters to commit a wide variety of crimes, says James Scott of the Institute for Critical Infrastructure Technology.

Sep 27, 2016

Cloud Security Paradigm: Time for Change?

Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.

Sep 27, 2016

Why Hashed Passwords Aren't Implemented Correctly

The latest ISMG Security Report leads off with a segment in which Managing Editor Jeremy Kirk explains that the massive Yahoo breach not only exposed the accounts of a half-billion customers, but also the weaknesses in the way enterprises employ hashed passwords.

Sep 27, 2016

Why CISOs Must Make Application Security a Priority

As pressure to speed the development of applications intensifies, CISOs must be the "voice of reason," taking a leadership role in ensuring security issues are addressed early in app development process, says John Dickson, principal at Denim Group, a Texas-based security consultancy.

Sep 26, 2016

Achieving Resilient Cybersecurity

In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture. Michael Kaczmarek of VeriSign describes how to achieve this resiliency.

Sep 26, 2016

Yahoo's Mega Breach: Security Takeaways

Security expert Sean Sullivan isn't surprised that the massive 2014 breach of Yahoo, which exposed at least 500 million account details, only recently came to light. Here's why, as well as what users must learn from this breach.

Sep 24, 2016

The Malware Threat Grows: So Now What?

Given the rapid spread of malware and difficulties with detection, what actions should organizations take? In this interview, Chris Novak of Verizon and Stephen Orfei of the PCI Security Standards Council offer insights.

Sep 23, 2016

Typical Cost of a Data Breach: $200,000 or $7 Million?

In this latest edition of the ISMG Security Report, you'll hear an explanation why estimates from the Ponemon Institute and The Rand Corp. on typical enterprise data breach costs vary so widely. Also, analyses of a car hack, SWIFT's latest initiative to help banks mitigate fraud and the Yahoo breach.

Sep 23, 2016

Why Is Ransomware So Successful?

Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes, CTO at Trend Micro.

Sep 20, 2016

Aligning Cyber Framework with Organization's Strategy, Goals

A report on a new self-assessment tool that's intended to show whether an enterprise's cyber-risk initiative aligns with its goals and strategy leads the latest edition of the ISMG Security Report.

Sep 20, 2016

Helping Police Solve Cybercrimes

Because many law enforcement agencies lack cybercrime expertise, it's important for companies that have been attacked to provide as much technical and forensic information as possible to authorities to help ensure that investigations lead to arrests and prosecutions, a panel of experts says.

Sep 19, 2016

Safeguarding Data from Politically Motivated Breaches

The recent hacker attack targeting the drug records of Olympic athletes, as well as other breaches involving high-profile targets, highlight the challenges involved in protecting sensitive data from external attackers or malicious insiders driven by political and other causes, says security expert Sean Curran.

Sep 16, 2016

ISMG Summit Wrap Up: Data Complexity Facilitates Cyber Risk

A roundup of the just-concluded ISMG Fraud and Breach Prevention in Toronto leads the latest edition of the ISMG Security Report. Also, how one CISO gets his security message across to the board and the challenges CISOs face during their first 100 days on the job.

Sep 16, 2016

Security Investments Shifting to Detection and Response

The paradigm shift in security from prevention to detection and response has finally arrived in Asian markets, says Sid Deshpande, Gartner principal analyst, who shares insights on 2016 trends.

Sep 14, 2016

Senator Seeks Probe of Bank Over Privacy Violations

Bank watchdog Sen. Elizabeth Warren is going after Wells Fargo for violating the privacy of bank customers. This news leads the latest edition of the ISMG Security Report.

Sep 13, 2016

A CISO's First 100 Days

The first 100 days on the job can be daunting for security leaders as they work toward understanding the organization's posture, while at the same time defending it around the clock. Gartner's Tom Scholtz shares insights on meeting key milestones.

Sep 9, 2016

Does Donald Trump Understand Cybersecurity?

An analysis of U.S. Republican presidential candidate Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, the U.S. federal government gets its first chief information security officer.

Sep 9, 2016

Why Healthcare Needs to Standardize Threat Info Sharing

Cyber threat information sharing in the healthcare sector urgently needs to be standardized so organizations can take appropriate action based on the intelligence, says Jeffrey Vinson, CISO of Harris Health System, who discusses findings emerging from ongoing federally funded research.

Sep 8, 2016

Building an Effective Network Defense Using Threat Intelligence

Based on Lockheed Martin's experience in the aftermath of a data breach, the company advises organizations to diligently gather threat intelligence internally to support development of an effective mitigation strategy, says Chris Coryea, cyber intelligence specialist.

Sep 6, 2016

Understanding the Threat Intelligence Ecosystem

Everybody talks about threat intelligence today, but how well are they distinguishing raw data from actionable intelligence? Stephen Gates of NSFOCUS discusses cybersecurity and the new threat intelligence ecosystem.

Sep 6, 2016

Did Outdated Systems Pave Way to OPM Hack?

The ISMG Security Report leads with a report on Federal CIO Tony Scott partly blaming the way Congress funds agencies for the 2015 breach of computers at the Office of Management and Budget that exposed 21.5 million records.

Sep 6, 2016

Reporting Medical Device Security Issues the Right Way

A report on the implications of failing to notify manufacturers of security flaws in their medical devices and a conversation with internet co-founder Vint Cerf highlight the latest edition of the ISMG Security Report.

Sep 2, 2016

When Do Medical Device Security Flaws Equal Clinical Risk?

At least some of the alleged cybersecurity vulnerabilities in St. Jude Medical cardiac devices that were found by research firm MedSec Holdings don't necessarily translate to serious clinical risks for patients, says medical device security expert Kevin Fu.

Sep 1, 2016

Defending the Inside and Outside of Data Centers

Data centers are difficult to defend, and securing the perimeter is important but of little consequence if attackers get inside. But there are ways to lock down data centers, former White House strategist Nathaniel Gleicher explains in this interview.

Sep 1, 2016

US CIO: Federal Funding Process Played Key Role in OPM Hack

The way the U.S. federal government funds information technology served as a major contributor to last year's breach of computers at the Office of Personnel Management that exposed 21.5 million records, says Federal Chief Information Officer Tony Scott.

Sep 1, 2016

How to Cope With Intelligence Agency Exploits

Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.

Aug 31, 2016

Implementing a Behavioral-Based Approach to Security

Just as seasonal flu viruses change from year to year, so too malware threats quickly evolve, necessitating a behavioral-based approach to security, says John Woods, CISO of pharmacy software vendor PDX Inc.

Aug 31, 2016

Vint Cerf's Outlook for the Internet He Helped Create

In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.

Aug 31, 2016

What's the Best Way to Handle Medical Device Security Concerns?

Cybersecurity expert Joshua Corman analyzes the importance of properly handling disclosure of medical device vulnerabilities to avoid jeopardizing patients' health. He laments that the proper protocol was not followed when allegations about devices from St. Jude Medical, which the firm refutes, were made public.

Aug 30, 2016

States Warned of Possible Attack Against Voter Systems

A report on an FBI warning to state election officials that their IT systems could be hacked leads the latest edition of the ISMG Security Report. Also, Australian officials mull bitcoin technology to secure elections.

Aug 30, 2016

Just In Case: Saving Up to Pay Off Ransomware Attacker

A report exploring how some organizations have been stockpiling bitcoins to use to pay off attackers if, or when, they become victimized by ransomware attacks leads the latest edition of the ISMG Security Report.

Aug 26, 2016

Patch or Perish: Fix Which Flaws First?

The process of managing software vulnerabilities inside the enterprise is complicated by the sheer number of patches that must be assessed, applied, tested and rolled out, says Wolfgang Kandek of Qualys, who offers suggestions on how to better focus those efforts.

Aug 25, 2016

Mitigating the Maturing Mobile Threat

For years now, security experts have been predicting 'the year mobile threats come of age.' Is it finally here? BioCatch's Uri Rivner discusses the recent surge in mobile threats - and what to do about them.

Aug 25, 2016

The Maturing of the InfoSec Workforce

Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.

Aug 24, 2016

Demystifying the Dark Web

By nature of its name and reputation, the so-called "dark web" has acquired a unique reputation. Danny Rogers of Terbium Labs discusses some of the key myths and realities about the dark web, as well as how organizations should monitor it.

Aug 24, 2016

Making USB Great Again

A report analyzing the development of a defense against attackers who exploit USB devices to hack into computers leads the latest edition of the ISMG Security Report.

Aug 23, 2016

The Details Behind HHS Breach Investigation Ramp-Up

In this in-depth interview, Iliana Peters of the HHS Office for Civil Rights explains the agency's strategy for ramping up investigations of health data breaches affecting fewer than 500 individuals.

Aug 23, 2016

Providing Frictionless ID Management

Passwords' days are numbered as businesses attempt to deliver a better user experience to their online customers, as well as apply better identity management practices, says CA's Paul Briault.

Aug 22, 2016

Tackling the Rising Cost of Security

Security spending - as a percentage of IT budgets - in recent years has been getting out of hand, says Chris Richter of Level 3 Communications, who offers suggestions for how to better keep costs under control.

Aug 22, 2016

NIST Updating Guidance on Protecting Federal Information

In an in-depth interview, Ron Ross of the National Institute of Standards and Technology explains pending revisions of guidance on how organizations outside the U.S. government should protect sensitive federal data.

Aug 19, 2016

Tackling Medical Device Security as a Public Health Issue

Medical device cybersecurity must be recognized as a critical public health issue so that all segments of the healthcare sector understand their roles in addressing the many complicated challenges involved, says Dale Nordenberg, M.D., of the Medical Device Innovation, Safety and Security Consortium.

Aug 19, 2016

Unraveling the Mystery Behind the Equation Group

Hear ISMG editors untangle the various elements in the Shadow Brokers-Equation Group saga, evaluate a new anti-ransomware tool and reflect on the 10th anniversary of the PCI Security Standards Council in this edition of the ISMG Security Report.

Aug 19, 2016

Using Cybernetics to Tell the Security Story

Sam Lodhi, director at niche services firm IBRS, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other verticals.

Aug 18, 2016

Building a Better Defence

As new schemes from hackers get more disruptive and harmful, it is critical to scale up defences, disrupt these attacks and make your organization a lesser target. Alex Holden, founder and CISO of Hold Security, tells how.

Aug 17, 2016

When a DDoS Attack Isn't a DDoS Attack

A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy standards more stringently.

Aug 16, 2016

Medical Device Security: Creating an Inventory

The creation of sophisticated inventory systems is critical to ensuring the security of an organization's diverse medical devices, says Dale Nordenberg, M.D., who heads a medical device security consortium. Learn about the group's latest efforts in this arena.

Aug 15, 2016

Taking Initial Steps to Create an ISAO

The head of the nearly year-old ISAO Standards Organization, Greg White, describes how fledgling Information Sharing and Analysis Organizations can help create an information sharing ecosystem aimed at making IT more secure at enterprises of all sizes.

Aug 15, 2016

How Patient Consent Policies Affect Health Info Exchange

Granular patient consent policies - adopted despite HIPAA allowing certain data to be shared without explicit patient consent - can lead to less data being exchanged by healthcare entities, says researcher Julia Adler Milstein of the University of Michigan, who describes results of a new study.

Aug 12, 2016