PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 9 of 70

Cloud Security: With Challenges Come Solutions

With security tools, it’s essential to provide full coverage and full security visibility for the environment. Avi Shua discusses Orca Security's solution to those challenges and how it identifies risk-sensitive data and speeds up the process.

Mar 2, 2022

Health Data Privacy and Security Regulations: What's Next?

Gaps in federal regulations concerning the security and privacy of health data falling outside HIPAA's umbrella are getting filled to some extent by various state laws. But that's creating additional challenges, says privacy attorney Kirk Nahra of the law firm WilmerHale.

Feb 28, 2022

Ukraine Crisis: How the Rules of Cyber Warfare Are Changing

The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.

Feb 24, 2022

Impact of 'Weaponization of Data' Attacks on Healthcare

The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.

Feb 23, 2022

The Ransomware Files, Episode 5: Texas and REvil

In 2019, 23 cities across Texas were struck by one of the largest ransomware attacks ever in the U.S. The attack, which involved the REvil ransomware, started with a compromised managed service provider. While the cities recovered quickly, the MSP sustained irreparable damage.

Feb 22, 2022

Cybercrime Markets: The Latest Movers, Shakers and Losers

The latest edition of the ISMG Security Report features an analysis of takedowns of multiple Russian-language cybercrime markets and communities by Russian authorities. It also describes the role of cryptocurrencies in the banking sector and how the identity market will evolve in 2022.

Feb 17, 2022

Regulatory Moves That Could Improve Medical Device Security

Regulators should require all medical device makers to include a baseline of certain cybersecurity protections in their products and to build in a feature that allows safe vulnerability scanning of their devices, says researcher Daniel Bardenstein, a strategist at CISA.

Feb 15, 2022

How to Put the 'Sec' Into DevSecOps

You can see it in the headlines: Apps are a prominent vector for adversaries to get entry into organizations and access to the digital crown jewels. Daniel Shugrue of Digital.ai tells why "shift left" means far more than just testing software for vulnerabilities.

Feb 14, 2022

Biggest Cryptocurrency Seizure in US History

This edition of the ISMG Security Report analyzes what prosecutors say is the biggest cryptocurrency seizure in U.S. history as well as the biggest financial seizure. It also details how a school district CISO resigned over the district's handling of a severe data breach and busts Zero Trust myths.

Feb 10, 2022

Improving the Market With Higher Security

Jeff Williams, co-founder and CTO of Contrast Security, says people have a right to know if the products they use are secure. It's difficult to tell if software is secure, he says, so companies need incentives to build good security programs, improve their software and disclose any flaws they find.

Feb 10, 2022

Health Data Breach Trends: The Latest Ups and Downs

Michael Hamilton, CISO at security firm Critical Insight, discusses health data breach trends. The bad news: The number of major breaches reported to regulators in 2021 hit a record high. The good news: The rate of breaches reported last year compared to 2020 appears to be slowing down.

Feb 10, 2022

Preparing the Entire Workforce for Devastating Cyberattacks

It is essential that entities across all industries - and especially in healthcare - better prepare every type and level of worker on how to respond to potentially devastating ransomware attacks, says privacy and security attorney Erik Weinick of law firm Otterbourg PC.

Feb 8, 2022

Russian Cyber Operations Target Ukraine: What Happens Next?

The latest edition of the ISMG Security Report features an analysis of how Russia's escalation in Ukraine is raising cyber defense alarms. It also describes how a Dark Overlord collaborator received a three-year prison sentence and shares tips for Zero Trust implementation.

Feb 4, 2022

Why Cyberattacks Are the No. 1 Health Tech Danger in 2022

As ransomware and other disruptive security incidents continue to surge, cyberattacks rank as the top health technology hazard in hospital environments this year, say security experts Chad Waters and Juuso Leinonen of patient safety organization ECRI.

Feb 1, 2022

Challenges in the World of Cybersecurity Marketing

Ravi Patil, director of product management and strategy at Broadcom, says partnering with customers to develop cybersecurity marketing "offers a markedly superior customer experience than a traditional vendor that might just sell the software and walk away until the contract is up."

Feb 1, 2022

Vetting the Security Risks of Open-Source Code in Healthcare

Healthcare organizations must carefully scrutinize any implementation of applications, software suites and other technology platforms that could contain open-source code because of the risks - including potential patient safety issues - posed by these components, says attorney Steven Teppler.

Jan 28, 2022

All the World's a Stage: Russia Arrests Ransomware Suspects

The latest edition of the ISMG Security Report features an analysis of whether a new ransomware operation is a spinoff of the notorious REvil or simply copying the group's moves; how Maersk responded to the NotPetya wiper malware attack; and essential incident response skills.

Jan 28, 2022

Brand Narratives and Awareness in Cybersecurity

Kyle Flaherty has worked with a range of companies, changing the worlds of big data, IoT, BYOD, SaaS, open-source software, network security, fraud detection, data analytics, marketing automation and network management. He weighs in on brands and how metrics feed different audiences.

Jan 25, 2022

The Ransomware Files, Episode 4: Maersk and NotPetya

Maersk was one of dozens of organizations crippled by the NotPetya malware in June 2017. Gavin Ashton and Bharat Halai worked in identity and access management at Maersk and share how the company's technology team tirelessly brought the company back from the brink of an IT systems meltdown.

Jan 25, 2022

Ukraine Cyber Attacks: A Case of Hacktivism?

The latest edition of the ISMG Security Report features an analysis of whether the cyberattacks that hit Ukraine's government agencies last week are attributable to any group or nation-state along with updates to the cybersecurity executive order and illicit cryptocurrency trends.

Jan 21, 2022

How Medical Device 'Ingredient Labels' Could Bolster Security

Among the simplest things that vendors can do to help improve the cybersecurity of their products is providing better transparency, especially regarding the third-party components contained in their technology, says Rob Suárez, CISO of medical device maker Becton Dickinson.

Jan 20, 2022

Why SBOMs in the Healthcare IT Supply Chain Are Critical

Because healthcare IT environments are so complicated, it will become essential for all suppliers to provide and maintain a software bill of materials for their products to remain relevant, says Curt Miller of the Healthcare Supply Chain Association.

Jan 19, 2022

Healthcare Cybersecurity: Why Resilience Is No Longer Enough

Over the past decade, many healthcare cybersecurity programs have evolved from "recovery" to "resilience." But Jon Moore of Clearwater says resilience is no longer sufficient against relentless attackers. He now promotes a philosophy that embraces "antifragility," including more and varied testing.

Jan 18, 2022

Ransomware Gatecrashes the Apache Log4j Attack Party

The latest edition of the ISMG Security Report features an analysis of how attackers are distributing Night Sky crypto-locking malware to exploit Log4j vulnerabilities, lessons learned from Log4j and a security flaw that affects some Tesla-built vehicles.

Jan 14, 2022

Coming Invasion? Russian Cyber Activity in Ukraine Escalates

The latest edition of the ISMG Security Report features an analysis of the recent surge in Russian cyber interference in Ukrainian government and civilian networks, the impact of China's privacy law, and the battle against cryptocurrency cybercrime.

Jan 7, 2022

2021 End-of-Year Special: Examining Biden's Executive Order

The latest edition of the ISMG Security Report features highlights from interviews in 2021 and examines President Joe Biden's executive order on cybersecurity, ransomware response advice and assessing hidden business risks.

Dec 31, 2021

How Evolving Privacy Regulations Affect Consumer Health Apps

Health technology providers - including makers of mobile health apps, personal health records, fitness devices and other related products - must keep a watchful eye on critical evolving privacy and regulatory issues in the months ahead, says attorney Brad Rostolsky of the law firm Reed Smith.

Dec 30, 2021

DevSecOps in Healthcare: Critical Considerations

As healthcare entities set out to better secure cloud application development and management, there are several critical considerations they must not overlook. Key among these: "the need to move to a DevSecOps model in the first place," says Adrian Mayers, CISO of health insurer Premera Blue Cross.

Dec 29, 2021

Preventing 'Rogue Device' Attacks: A Case Study

Preventing rogue device attacks is a critical component of Baptist Health's zero trust strategy, says Michael Erickson, CISO of the healthcare delivery system, which operates nine hospitals and other care facilities in Kentucky and Indiana.

Dec 28, 2021

Why Healthcare Will Remain a Top Cyberattack Target in 2022

Two years into the pandemic, pharmaceutical firms remain a top target for cybercriminals, and that trend will undoubtedly persist in 2022, says Paul Prudhomme, a former Department of Defense threat analyst who is now a researcher with cybersecurity threat intelligence firm IntSights.

Dec 28, 2021

Medical Device Incident Response: Patient Safety Concerns

The Cloud Security Alliance's new medical device incident response playbook aims to help healthcare entities plan for security incidents involving different types of devices, taking into consideration varying patient safety issues, say co-authors Christopher Frenz of Mount Sinai South Nassau and Brian Russell of TrustThink.

Dec 27, 2021

Fighting the Serious Apache Log4j Flaw: What's the Latest?

The latest edition of the ISMG Security Report features an analysis of the most recent developments in the Log4j security flaw crisis, ransomware-era incident response essentials and what to expect from cybersecurity in 2022.

Dec 24, 2021

Making Cybersecurity Marketing People-Centric

Sherry Lowe, who has been in senior leadership in the marketing space for over a decade, focuses on not letting metrics kill marketing. She discusses injecting more creativity into cybersecurity marketing strategy and standing out in a market full of look-alikes.

Dec 17, 2021

Log4j Special: What You Need to Know

The latest edition of the ISMG Security Report features an analysis of the Log4j security flaw, including the risks and mitigation techniques, how to patch Log4j, and CISO Dawn Cappelli on Log4j response.

Dec 17, 2021

Log4j Zero-Day: 'It's About as Serious as It Gets'

How serious is the Apache Log4j zero-day vulnerability that was announced to the world on Friday? "It's big," says Sam Curry, chief security officer at Cybereason, which has developed a "vaccine" to help. "I hate hyperbole generally," Curry says. "But it is a 10 on the criticality scale."

Dec 11, 2021

Western Governments Gunning for Ransomware Infrastructure

The latest edition of the ISMG Security Report features an analysis of how the U.S. military has been "imposing costs" on ransomware groups. Also featured: a twist in the case of the Missouri governor vs. an alleged "hacker," and CyberTheory's Steve King on "why Zero Trust?"

Dec 10, 2021

The 'Doctor of Zero Trust' Says 'Change and Get Better'

With the support of the recent executive order on improving the nation's cybersecurity, Zero Trust strategy is gaining greater recognition. But there is still a degree of resistance to Zero Trust adoption. Dr, Chase Cunningham, CSO of Ericom, discusses this and other issues around Zero Trust.

Dec 9, 2021

The Ransomware Files, Episode 3: Critical Infrastructure

Cybersecurity experts worry about attacks and ransomware directed at the 70,000 water and wastewater facilities in the U.S. In November 2020, the Hampton Roads Sanitation District was infected with Ryuk ransomware. Fortunately, its operational technology systems were unaffected, and it recovered.

Dec 9, 2021

Need to Negotiate a Ransomware Payoff? Newbies: Start Here

The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.

Dec 3, 2021

Cybersecurity Unplugged: Improving Healthcare Security

In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."

Nov 26, 2021

Essential Preparations for the Holiday Season Attack Surge

The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?

Nov 26, 2021

Why Ransomware Is a Game Changer for Cyber Insurance

Ransomware attacks have become the game changer in driving up security requirements, policy premiums and rejection rates for healthcare sector entities seeking new cyber insurance policies or renewals, says Doug Howard, CEO of privacy and security consultancy Pondurance.

Nov 24, 2021

Cybersecurity Unplugged: Start on the Zero Trust Journey

Drawing on his deep background in technology, government and law, cybersecurity adviser Tony Scott delves into many pressing issues in cybersecurity today - including zero trust. In this episode of "Cybersecurity Unplugged," he says organizations should get started on the journey now.

Nov 23, 2021

Healthcare's Biggest Security Challenges and Frustrations

Many healthcare entities are resistant to implement multifactor authentication, and that is among the most frustrating critical security mistakes that organizations in that sector make, says Tom Walsh, founder of security consultancy tw-Security.

Nov 23, 2021

Cryptocurrency Conundrum: How to Make Dirty Bitcoins Clean?

The latest edition of the ISMG Security Report features an analysis of how cybercriminals are turning to cryptomixing services to conceal the proceeds of ransomware activities from law enforcement officials. Also featured: Criminals exploit a misconfigured FBI server and the future of zero trust.

Nov 19, 2021

The Ransomware Files, Episode 2: Bridging Backup Gaps

This is the second episode of "The Ransomware Files," a podcast miniseries focused on stories of resilience in the fight against ransomware. An Australian company, Matthews, saw its backups corrupted and attackers release its data. The company recovered however, and has greatly improved its IT security defenses.

Nov 19, 2021

A Security Strategy for the Blockchain

Ari Redbord of TRM Labs, who has had an extensive career in law enforcement, points out that 2020 was a pivotal year for putting cybersecurity on the agenda throughout the government. He discusses securing cryptocurrecy, the blockchain and other elements of the "digital battlefield."

Nov 16, 2021

Feds' Ransomware Smackdown: Attackers' Days Numbered?

The latest edition of the ISMG Security Report features an analysis of the progress made by law enforcement agencies in the effort to crack down on ransomware. Also featured: Evil Corp banking malware still active; XDR market trends.

Nov 12, 2021

Deter Cybercriminals: Declare a Clear Response to Attacks

The latest edition of the ISMG Security Report features insight from U.S. Sen. Angus King on why the federal government needs to declare a clear response to cybercriminals in order to deter them. Also featured: Ransomware affiliates gain power and promoting diversity of thought in cybersecurity.

Nov 5, 2021

Tackling Growing Pandemic Cyberthreats in Healthcare

As the COVID-19 pandemic persists, cybersecurity threats and related risks continue to grow, including ransomware, external threats and especially those involving healthcare insiders, says Denise Anderson, president of the Health Information Sharing and Analysis Center.

Nov 4, 2021