PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 46 of 70

Tougher Challenges Ahead to Secure IT

Nine compelling threats will make securing IT more challenging than ever over the next two years, says Steve Durbin, managing director of the Information Security Forum.

Mar 26, 2015

Attackers Target Community Banks

Community banking institutions are at great risk of cyber-attack because they often don't think they're targeted, says Scott McGillivray of Pacific Continental Bank, who describes how to convey this risk to senior management.

Mar 24, 2015

APT & Cyber-Extortion: Who's at Risk?

Despite high-profile attacks and publicity, advanced persistent threats continue to strike organizations in all sectors. How can security leaders improve defenses? ThreatTrack's Usman Choudhary offers advice.

Mar 20, 2015

Cyber-Insurance Coverage Shifting

The way enterprises address information security will play an increasingly critical role in how cyber-insurance providers determine coverage and pricing, insurance experts told members of Congress at a recent hearing.

Mar 20, 2015

New Threat: ID Theft in the Workplace

As data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.

Mar 20, 2015

LifeLock at 10: Identity Fraud Evolves

When Todd Davis helped found LifeLock in 2005, ID fraud was a niche consumer issue. Today it's a major enterprise risk. What are today's top fraud threats, and where are some of the surprising security gaps?

Mar 18, 2015

Was Clinton Server Exposed to Hacks?

During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.

Mar 12, 2015

Spikes CEO on 'Air-Gapped' Browsers

When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.

Mar 11, 2015

Case Study: Thwarting Insider Threats

West Virginia United Health System is taking a multi-step approach to thwarting insider threats, including aggressive analysis of access audits, says assistant CIO Mark Combs, who helps lead the system's privacy and security efforts.

Mar 10, 2015

ID Fraud Drops for First Time Since 2010

ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater.

Mar 6, 2015

Bit9 CEO on Data Breach Defense

The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.

Mar 5, 2015

Consolidating IT as a Security Measure

Chris Buse, CISO for the state of Minnesota, says centralizing IT systems should make it easier to defend against cyber-attacks because there are fewer computing environments to protect.

Mar 3, 2015

When Fraud and Security Converge

Financial crimes, fraud and cybersecurity. These topics are quickly converging upon security organizations, and leaders must be prepared. FICO's Stuart Wells discusses the tools and skills needed for convergence.

Mar 2, 2015

Panel Addresses Union Budget, Security

Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.

Feb 27, 2015

What is Gov't Role in Info Sharing?

This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James.

Feb 27, 2015

Why Medical ID Fraud Is Rapidly Growing

As more patient records are digitized, that data is a rapidly growing target for cybercriminals intent on committing medical identity theft and fraud, says Ann Patterson of the Medical Identity Fraud Alliance, who analyzes a new report on the trends.

Feb 26, 2015

Why Hide Cyber Skirmishes With Iran?

Were DDoS attacks against major American banks in 2012 waged in retribution for U.S. government actions? A recently leaked top-secret memo prepared in 2013 for Keith Alexander, who was then NSA director, seems to confirm that's the case.

Feb 25, 2015

Four Steps for Securing Medical Devices

As new cyberthreats emerge, medical device maker Philips Healthcare is implementing a four-prong strategy for ensuring the cybersecurity of its products. Michael McNeil, global product security and services officer, outlines the steps.

Feb 23, 2015

India's Hackers Come of Age

With white-hat security researchers gaining increasing mainstream recognition, hacking as a vocation is no longer taboo - and Indian researchers are flocking to the profession, says HackerOne's Katie Moussouris

Feb 23, 2015

Understanding the Hacker Mindset

Learning more about potential attackers and their preferred information targets is one of the best ways organizations can mitigate their cyber-attack risks, says Bank of the West's David Pollino, a featured speaker at ISMG's Fraud Summit LA.

Feb 20, 2015

Will Obama's Information Sharing Plan Work?

Information sharing and analysis organizations being formed under President Obama's new executive order must avoid becoming silos that only share cyberthreat intelligence "within their own walls," warns Deborah Kobza, executive director of NH-ISAC.

Feb 20, 2015

The New Approach to DDoS Protection

Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.

Feb 19, 2015

Managing Cloud Providers: New Approach

Elayne Starkey, the state of Delaware's chief security officer, no longer micromanages how cloud services providers secure state data. Find out why she's giving providers more leeway in defining security requirements.

Feb 18, 2015

New Details About $1 Billion Crime Ring

In an exclusive interview, Sergey Golonvanov, a threat researcher at Kaspersky Lab, offers insights about the Russian cybercrime ring that over the weekend made headlines for defrauding banks of up to $1 billion.

Feb 17, 2015

Inside Cisco's Annual Security Report

The volume of spam messaging is down, but the bogus messages that are getting through? They're more malicious than ever, says Cisco's Jason Brvenik. He shares insights from Cisco's 2015 Security Report.

Feb 16, 2015

Cyber-Insurance: How Much Is Enough?

Mega-breaches, including the recent hacking attack on Anthem Inc. always result in an uptick of interest in cyber-insurance, but determining how much coverage to buy is an ongoing challenge, says data privacy attorney Marc Voses.

Feb 16, 2015

'CIO of Year' on Defending Against Hackers

What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers.

Feb 13, 2015

Raduege: Why New Cyber Agency Matters

A new federal cyberthreat intelligence center could help the government build more resilient networks and better identify cyber-attackers, leading to arrests and punishments, says Harry Raduege, a former top Defense Department IT leader.

Feb 12, 2015

Phishing: Learning from Recent Breaches

The Anthem breach, which possibly started with a phishing campaign, is a prime example of how hackers are perfecting their schemes to target key employees who have access to valued information, says Dave Jevans of the Anti-Phishing Working Group.

Feb 12, 2015

Why 'Adaptive Defense' Is Critical

As hack attacks, such as the breach of Anthem Inc., become more common, it's more critical than ever for organizations to carry out an "adaptive defense model" to protect sensitive information, says Dave Merkel, chief technology officer at FireEye.

Feb 12, 2015

Can PINs Reduce Online Fraud?

PINS can effectively reduce card-not-present as well as card-present fraud, argues Liz Garner of the Merchant Advisory Group, who will be a featured speaker at Information Security Media Group's upcoming Fraud Summit Los Angeles.

Feb 10, 2015

Improving Cyberthreat Intelligence

Technologies that allow companies to analyze cyberthreats are evolving and soon should provide better intelligence to mitigate attacks, says Jim Anderson, a president at BAE Systems Applied Intelligence.

Feb 10, 2015

Risk Management Lessons from Anthem Hack

The recent cyber-attack on health insurer Anthem Inc. is a "call to action" for the healthcare sector to adopt a much more sophisticated approach to risk management, says security expert Lisa Gallagher of HIMSS.

Feb 6, 2015

Security Program: Elements of Success

There is no such thing as 100 percent security, so what does a truly successful security program look like? Mike Gentile of Auxilio describes the key elements of a formal program and how best to deploy them.

Feb 6, 2015

Why Fraud Is Shifting to Mobile Devices

As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.

Feb 5, 2015

Monitoring Third-Party Breach Risks

Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.

Feb 4, 2015

New Strategies to Fight Email Fraud

Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.

Feb 4, 2015

Visa on Unique EMV Challenges in U.S.

Visa executive Kimberly Lawrence contends that the ongoing U.S. migration to EMV is progressing more rapidly than in other markets that have made the transition, requiring outside-the-box rules for debit transactions and cardholder verification.

Feb 3, 2015

Radware CEO on Identifying Intruders

Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.

Feb 2, 2015

Brazil: The Global Fraud Test Kitchen

IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.

Jan 30, 2015

SafeNet CEO on Data Breach Security

Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.

Jan 29, 2015

PCI's Leach on Fed's Fast Payment Plan

The Federal Reserve's just-released plan for faster payments and technology standardization, while applicable to ACH and wire transactions, won't easily translate for card payments, says Troy Leach of the PCI Security Standards Council.

Jan 29, 2015

VASCO CEO on Authentication Trends

The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.

Jan 26, 2015

ATM: Attacking Multichannel Fraud

The globalization of fraud waged by organized crime has spurred new cross-channel attacks and is affecting how ATM operators approach data security, executives from three of the world's leading ATM manufacturers explain in this exclusive interview.

Jan 15, 2015

ATM Security: Improving Threat Intelligence

ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.

Jan 13, 2015

India's 2015 Data Privacy Agenda

The subject of privacy has been debated ever since the release of the AP Shah Committee report on the subject. Kamlesh Bajaj, CEO of the Data Security Council of India, shares insights on how the nation's Data Privacy Act may finally be taking shape.

Jan 12, 2015

Expert: Sony Hackers Sound Russian

The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo Engelson Argamon says the messages appear to have been written by native Russian speakers.

Jan 12, 2015

ATM: Is Contactless the Future?

How will EMV and contactless payments reduce ATM-related card fraud? In part one of this three-part exclusive interview, executives from the world's top three ATM manufacturers discuss how they're helping banking institutions address emerging fraud trends.

Jan 9, 2015

Fidelis CEO on Breach Response

Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.

Jan 8, 2015

Why Major Retailers Want Chip and PIN

Mark Horwedel of the Merchant Advisory Group says that while U.S. merchants are committed to enhancing payments security, without PINs, chip cards will do little to reduce card fraud.

Jan 6, 2015