Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editora: Podcast
  • Mais informações

Informações:

Sinopse

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episódios

  • Impact of 'Weaponization of Data' Attacks on Healthcare

    23/02/2022

    The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.

  • The Ransomware Files, Episode 5: Texas and REvil

    22/02/2022

    In 2019, 23 cities across Texas were struck by one of the largest ransomware attacks ever in the U.S. The attack, which involved the REvil ransomware, started with a compromised managed service provider. While the cities recovered quickly, the MSP sustained irreparable damage.

  • Cybercrime Markets: The Latest Movers, Shakers and Losers

    17/02/2022

    The latest edition of the ISMG Security Report features an analysis of takedowns of multiple Russian-language cybercrime markets and communities by Russian authorities. It also describes the role of cryptocurrencies in the banking sector and how the identity market will evolve in 2022.

  • Regulatory Moves That Could Improve Medical Device Security

    15/02/2022

    Regulators should require all medical device makers to include a baseline of certain cybersecurity protections in their products and to build in a feature that allows safe vulnerability scanning of their devices, says researcher Daniel Bardenstein, a strategist at CISA.

  • How to Put the 'Sec' Into DevSecOps

    14/02/2022

    You can see it in the headlines: Apps are a prominent vector for adversaries to get entry into organizations and access to the digital crown jewels. Daniel Shugrue of Digital.ai tells why "shift left" means far more than just testing software for vulnerabilities.

  • Biggest Cryptocurrency Seizure in US History

    10/02/2022

    This edition of the ISMG Security Report analyzes what prosecutors say is the biggest cryptocurrency seizure in U.S. history as well as the biggest financial seizure. It also details how a school district CISO resigned over the district's handling of a severe data breach and busts Zero Trust myths.

  • Improving the Market With Higher Security

    10/02/2022

    Jeff Williams, co-founder and CTO of Contrast Security, says people have a right to know if the products they use are secure. It's difficult to tell if software is secure, he says, so companies need incentives to build good security programs, improve their software and disclose any flaws they find.

  • Preparing the Entire Workforce for Devastating Cyberattacks

    08/02/2022

    It is essential that entities across all industries - and especially in healthcare - better prepare every type and level of worker on how to respond to potentially devastating ransomware attacks, says privacy and security attorney Erik Weinick of law firm Otterbourg PC.

  • Russian Cyber Operations Target Ukraine: What Happens Next?

    04/02/2022

    The latest edition of the ISMG Security Report features an analysis of how Russia's escalation in Ukraine is raising cyber defense alarms. It also describes how a Dark Overlord collaborator received a three-year prison sentence and shares tips for Zero Trust implementation.

  • Challenges in the World of Cybersecurity Marketing

    01/02/2022

    Ravi Patil, director of product management and strategy at Broadcom, says partnering with customers to develop cybersecurity marketing "offers a markedly superior customer experience than a traditional vendor that might just sell the software and walk away until the contract is up."

  • All the World's a Stage: Russia Arrests Ransomware Suspects

    28/01/2022

    The latest edition of the ISMG Security Report features an analysis of whether a new ransomware operation is a spinoff of the notorious REvil or simply copying the group's moves; how Maersk responded to the NotPetya wiper malware attack; and essential incident response skills.

  • Brand Narratives and Awareness in Cybersecurity

    25/01/2022

    Kyle Flaherty has worked with a range of companies, changing the worlds of big data, IoT, BYOD, SaaS, open-source software, network security, fraud detection, data analytics, marketing automation and network management. He weighs in on brands and how metrics feed different audiences.

  • The Ransomware Files, Episode 4: Maersk and NotPetya

    25/01/2022

    Maersk was one of dozens of organizations crippled by the NotPetya malware in June 2017. Gavin Ashton and Bharat Halai worked in identity and access management at Maersk and share how the company's technology team tirelessly brought the company back from the brink of an IT systems meltdown.

  • Ukraine Cyber Attacks: A Case of Hacktivism?

    21/01/2022

    The latest edition of the ISMG Security Report features an analysis of whether the cyberattacks that hit Ukraine's government agencies last week are attributable to any group or nation-state along with updates to the cybersecurity executive order and illicit cryptocurrency trends.

  • Why SBOMs in the Healthcare IT Supply Chain Are Critical

    19/01/2022

    Because healthcare IT environments are so complicated, it will become essential for all suppliers to provide and maintain a software bill of materials for their products to remain relevant, says Curt Miller of the Healthcare Supply Chain Association.

  • Ransomware Gatecrashes the Apache Log4j Attack Party

    14/01/2022

    The latest edition of the ISMG Security Report features an analysis of how attackers are distributing Night Sky crypto-locking malware to exploit Log4j vulnerabilities, lessons learned from Log4j and a security flaw that affects some Tesla-built vehicles.

  • Coming Invasion? Russian Cyber Activity in Ukraine Escalates

    07/01/2022

    The latest edition of the ISMG Security Report features an analysis of the recent surge in Russian cyber interference in Ukrainian government and civilian networks, the impact of China's privacy law, and the battle against cryptocurrency cybercrime.

  • 2021 End-of-Year Special: Examining Biden's Executive Order

    31/12/2021

    The latest edition of the ISMG Security Report features highlights from interviews in 2021 and examines President Joe Biden's executive order on cybersecurity, ransomware response advice and assessing hidden business risks.

  • DevSecOps in Healthcare: Critical Considerations

    29/12/2021

    As healthcare entities set out to better secure cloud application development and management, there are several critical considerations they must not overlook. Key among these: "the need to move to a DevSecOps model in the first place," says Adrian Mayers, CISO of health insurer Premera Blue Cross.

  • Fighting the Serious Apache Log4j Flaw: What's the Latest?

    24/12/2021

    The latest edition of the ISMG Security Report features an analysis of the most recent developments in the Log4j security flaw crisis, ransomware-era incident response essentials and what to expect from cybersecurity in 2022.

Página 20 de 145