PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 42 of 70

Why Cybercrime Now Exceeds Conventional Crime

Drawn by the potential for low risk and high reward, criminals worldwide are increasingly pursuing online crime instead of conventional forms of property crime, such as burglary and robbery, warns cybersecurity expert Alan Woodward.

Sep 15, 2015

Overcoming ID and Access Management Struggles

Pediatric hospitals face an assortment of ID and access management challenges when managing Web portals that provide access to patient data, says Cris Ewell, CISO at Seattle Children's Hospital.

Sep 15, 2015

How the FBI Helped Recover Millions from Wire Fraud

FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.

Sep 15, 2015

Infusion Pump Security: NIST Refining Guidance

The National Institute of Standards and Technology is revamping its guidance on the cybersecurity of wireless infusion pumps. Gavin O'Brien of NIST's National Cybersecurity Center of Excellence describes the effort to tackle an issue that's attracting attention in the wake of a recent FDA alert.

Sep 11, 2015

Fighting Fraud: New Insights from a Former FBI Agent

As criminals get more savvy about circumventing financial institutions' fraud prevention controls, fraud-fighting collaboration among institutions and law enforcement officials is becoming more important, says Clyde Langley, a former FBI agent who'll be a presenter at ISMG's Sept. 15 Fraud Summit San Francisco.

Sep 9, 2015

MIT Offers Online Cybersecurity Training

The Massachusetts Institute of Technology is launching a new online cybersecurity course that aims to fill a gap for IT professionals as well as business leaders, says MIT's Clara Piloto.

Sep 9, 2015

Securing Buy-in to Fight APT

Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.

Sep 9, 2015

Commercializing Federal IT Security Wares

The federal government is licensing a government-built anomaly detection tool known as PathScan to Ernst & Young, which, in turn, will refine the software and market it. In an interview, DHS's Mike Pozmantier explains why the government is offering its technology to the private sector.

Sep 8, 2015

Preparing for Upcoming HIPAA Compliance Audits

To prepare for next year's resumption of HIPAA compliance audits, organizations must be ready to demonstrate how they're complying with the revised breach notification rule and how they're providing patients with electronic access to records, says attorney David Holtzman.

Sep 8, 2015

APT Attacks Will Seek Smaller Targets

With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.

Sep 7, 2015

Exclusive: OCR's McGraw on Timing of HIPAA Audits

In her first interview since joining the HHS Office for Civil Rights as deputy director of health information privacy, Deven McGraw describes plans to relaunch HIPAA compliance audits next year and outlines other priorities.

Sep 4, 2015

Account Takeovers: Did FFIEC Guidance Make a Difference?

Four years after the FFIEC issued its updated authentication guidance, many banking institutions say account takeover losses have gone up, a new survey shows. John LaCour of PhishLabs explains why institutions' reactive approach to fraud is failing.

Sep 3, 2015

FDA Official: More Medical Device Vulnerability Discoveries Are Likely

FDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use.

Sep 3, 2015

After Hacks, ONC Emphasizing ID and Access Management

In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.

Sep 2, 2015

How Hackers Are Bypassing Intrusion Detection

More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.

Sep 2, 2015

Incident Response: Lessons Government Can Learn from Industry

Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.

Sep 2, 2015

InfoSec Careers: How to Attract, Retain More Women

Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.

Sep 2, 2015

Proactive Malware Hunting

If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.

Sep 1, 2015

Fighting Healthcare Payments Fraud

When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.

Sep 1, 2015

How KeyRaider Malware Hacked 225K Apple Accounts

The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.

Sep 1, 2015

Will Medical Device Security Risks Grow?

Cybersecurity risks to medical devices will become an even more critical issue for healthcare organizations to address next year because of the need to maintain patient trust, says Rob Potter of Symantec.

Aug 31, 2015

Hacker Havens: The Rise of Bulletproof Hosting Environments

Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.

Aug 31, 2015

BA Agreements: Going Beyond the Basics

In preparing business associate agreements, healthcare organizations should demand a right-to-audit clause and copies of vendors' current security policies as proof that the companies are taking appropriate measures to protect patient data, says security expert Rebecca Herold.

Aug 27, 2015

Gartner's Litan Warns of EMV Fraud Risks

Although EMV is a far more secure payments technology, it can be exploited for fraud if it's improperly implemented, warns Gartner analyst Avivah Litan. What security lessons must be learned from past EMV deployments?

Aug 27, 2015

Killing Bugs: Focus on 'Half-Life'

CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.

Aug 26, 2015

Protecting Research Data: What Works?

One of the most difficult challenges in protecting sensitive patient data that's used in medical research is educating researchers and other clinicians who share that data about potential privacy issues, says Dave Summitt of Moffitt Cancer Center in Florida.

Aug 26, 2015

Venture Capitalist: 'I'm Still Bullish'

By the time venture capitalist Alberto Yépez had breakfast on Monday, global markets had plunged, and the Dow had lost 1,000 points and gained back nearly 900. His message to cybersecurity investors about the volatile market: "I'm still bullish."

Aug 24, 2015

Impact of Economically Weaker China on Cyber Spying

Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.

Aug 24, 2015

A CISO's Strategy for Fighting Phishing Attacks

Hacker attacks often start with spear-phishing attempts, but healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami, who describes her organization's approach.

Aug 24, 2015

Mitigating Organizational Risks After the Ashley Madison Leaks

To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.

Aug 24, 2015

Gartner's Litan: Top New Threats to Banks

Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?

Aug 24, 2015

Patient Data Matching: Privacy Challenges

Despite the ongoing ban on federal funding for the development of a national unique patient identifier, progress is being made through collaborative efforts to improve patient data matching to ensure safety and privacy, says security expert Lisa Gallagher.

Aug 21, 2015

EMV Shift: Preparing for a Fraud Migration

A migration of fraud to the card-not-present environment is expected in the wake of EMV. But Fiserv's Manuel Da Silva says banks also have to be worried about fraud upticks in other areas, which are already emerging. He explains how analytics can help institutions mitigate risks.

Aug 21, 2015

3 InfoSec Woes Plaguing Federal Agencies

An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.

Aug 19, 2015

FDA Device Alert: A Catalyst for Change

The recent FDA alert advising healthcare organizations to stop using a line of infusion pumps because of cybersecurity flaws, coupled with earlier guidance from the agency, will lead manufacturers to be more focused on risk management, predicts attorney Anna Spencer.

Aug 18, 2015

Why It's OK to Hack for Spying

Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.

Aug 17, 2015

How 'Neglect' Made Healthcare No.1 Target

After years of neglecting data security, the healthcare sector has only itself to blame for making itself an easy target for hackers, says David Kibbe, M.D., president and CEO of DirectTrust.

Aug 14, 2015

Is Windows 10 Secure for the Enterprise?

The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.

Aug 14, 2015

How Will FBI Examine Hillary's Server?

How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.

Aug 13, 2015

The Levels of Mobile Security

Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.

Aug 13, 2015

Breached Retailer: 'I Wish I Had Known How Sophisticated ...'

In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.

Aug 12, 2015

DHS Appoints Key Cybersecurity Leader

DHS Secretary Jeh Johnson taps Andy Ozment, assistant secretary of the Office of Cybersecurity and Communications, to undertake overall and direct charge for the National Cybersecurity and Communications Integration Center.

Aug 12, 2015

Re-Assessing the Skills Gap

Enough talk about the cybersecurity skills gap; it's time for a new strategy for filling it, says ISACA's Eddie Schwartz. The new CSX Practitioner certification is a step in the right direction, he says.

Aug 6, 2015

Lessons from Gameover Zeus Takedown

The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.

Aug 5, 2015

Partnering With HR to Prevent Breaches

Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.

Aug 5, 2015

Ex-FBI Official on Why Attribution Matters

Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.

Aug 5, 2015

Needle in a Haystack: Finding Malware

Georgia Tech researchers are attempting to develop new processes and technologies to more easily detect malware. The goal, researcher Wenke Lee explains, is to find an effective way to identify and expunge advanced persistent threats

Aug 4, 2015

Security: The New Measure of Success

"Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.

Aug 4, 2015

Sea-to-Sea: China Hacks in U.S.

An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.

Aug 2, 2015

Threat Intelligence - Context is King

Organizations are jumping on the threat intelligence bandwagon, but are they making strategic investments? Often not, says BrightPoint Security's Rich Reybok, who says "context" is often the key missing element.

Jul 31, 2015